<?xml version="1.0" encoding="UTF-8"?>
<oval_definitions
	xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
	xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
	xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
  <generator>
      <oval:product_name>Marcus OVAL Generator</oval:product_name>
      <oval:schema_version>5.5</oval:schema_version>
      <oval:timestamp>2017-09-27T05:00:47</oval:timestamp>
  </generator>
  <definitions>
<definition id="oval:org.opensuse.security:def:20022443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2002-2443</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2002-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-2443" source="CVE"/>
	<description>
	schpw.c in the kpasswd service in kadmind in MIT Kerberos 5 (aka krb5) before 1.11.3 does not properly validate UDP packets before sending responses, which allows remote attackers to cause a denial of service (CPU and bandwidth consumption) via a forged packet that triggers a communication loop, as demonstrated by krb_pingpong.nasl, a related issue to CVE-1999-0103.
	</description>
 </metadata>
<!-- c39bdbe610296d79e3993188cd5996f5 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077611" comment="krb5-32bit less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077619" comment="krb5-64bit less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077620" comment="krb5-apps-clients less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077621" comment="krb5-apps-servers less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077612" comment="krb5-client less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077613" comment="krb5-devel-32bit less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077622" comment="krb5-devel-64bit less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077614" comment="krb5-devel less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077623" comment="krb5-server less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077624" comment="krb5-x86 less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077615" comment="krb5 less than 1.4.3-19.49.53.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077620" comment="krb5-apps-clients less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077621" comment="krb5-apps-servers less than 1.4.3-19.49.53.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077623" comment="krb5-server less than 1.4.3-19.49.53.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0687</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0687" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in (1) xpmParseColors in parse.c, (2) ParseAndPutPixels in create.c, and (3) ParsePixels in parse.c for libXpm before 6.8.1 allow remote attackers to execute arbitrary code via a malformed XPM image file.
	</description>
 </metadata>
<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0688</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0688" source="CVE"/>
	<description>
	Multiple integer overflows in (1) the xpmParseColors function in parse.c, (2) XpmCreateImageFromXpmImage, (3) CreateXImage, (4) ParsePixels, and (5) ParseAndPutPixels for libXpm before 6.8.1 may allow remote attackers to execute arbitrary code via a malformed XPM image file.
	</description>
 </metadata>
<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0782</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0782" source="CVE"/>
	<description>
	Integer overflow in pixbuf_create_from_xpm (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, allows remote attackers to execute arbitrary code via certain n_col and cpp values that enable a heap-based buffer overflow.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0687).
	</description>
 </metadata>
<!-- c0136d5f769f780ec791f2b7c698b64b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037768" comment="gtk2-devel-64bit less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037767" comment="gtk2-devel less than 2.8.11-0.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0783</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0783" source="CVE"/>
	<description>
	Stack-based buffer overflow in xpm_extract_color (io-xpm.c) in the XPM image decoder for gtk+ 2.4.4 (gtk2) and earlier, and gdk-pixbuf before 0.22, may allow remote attackers to execute arbitrary code via a certain color string.  NOTE: this identifier is ONLY for gtk+.  It was incorrectly referenced in an advisory for a different issue (CVE-2004-0688).
	</description>
 </metadata>
<!-- c0136d5f769f780ec791f2b7c698b64b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037768" comment="gtk2-devel-64bit less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037767" comment="gtk2-devel less than 2.8.11-0.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0788</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0788" source="CVE"/>
	<description>
	Integer overflow in the ICO image decoder for (1) gdk-pixbuf before 0.22 and (2) gtk2 before 2.2.4 allows remote attackers to cause a denial of service (application crash) via a crafted ICO file.
	</description>
 </metadata>
<!-- c0136d5f769f780ec791f2b7c698b64b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037768" comment="gtk2-devel-64bit less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037767" comment="gtk2-devel less than 2.8.11-0.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20040891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2004-0891</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2004-0891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0891" source="CVE"/>
	<description>
	Buffer overflow in the MSN protocol handler for gaim 0.79 to 1.0.1 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via an "unexpected sequence of MSNSLP messages" that results in an unbounded copy operation that writes to the wrong buffer.
	</description>
 </metadata>
<!-- f83d87195bba0229ac4b65c0cd41c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037827" comment="NetworkManager-devel less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037828" comment="NetworkManager-glib less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037829" comment="NetworkManager-gnome less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037832" comment="NetworkManager less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037928" comment="audit-devel less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037834" comment="audit-libs-32bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037929" comment="audit-libs-64bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037835" comment="audit-libs-python less than 1.2.9-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037930" comment="audit-libs-x86 less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037836" comment="audit-libs less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037837" comment="audit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037842" comment="cifs-mount less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037845" comment="dhcp-client less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037931" comment="dhcp-devel less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037932" comment="dhcp-relay less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037933" comment="dhcp-server less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037846" comment="dhcp less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037934" comment="gdb-32bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037935" comment="gdb-64bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037936" comment="gdb-x86 less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037858" comment="gdb less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037862" comment="glib2-32bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037937" comment="glib2-64bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037863" comment="glib2-devel less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037864" comment="glib2-doc less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037938" comment="glib2-x86 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037865" comment="glib2 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037867" comment="gnome-filesystem less than 0.1-261.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037873" comment="gstreamer010-plugins-base-32bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037939" comment="gstreamer010-plugins-base-64bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037875" comment="gstreamer010-plugins-base-doc less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037940" comment="gstreamer010-plugins-base-x86 less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037880" comment="gstreamer010-plugins-base less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037888" comment="libbeagle-32bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037941" comment="libbeagle-64bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037942" comment="libbeagle-x86 less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037890" comment="libbeagle less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037892" comment="libgail-gnome less than 1.1.3-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037893" comment="libgdiplus less than 1.2.2-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037943" comment="libmsrpc-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037944" comment="libmsrpc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037896" comment="libsmbclient-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037945" comment="libsmbclient-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037897" comment="libsmbclient-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037946" comment="libsmbclient-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037898" comment="libsmbclient less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037899" comment="libtool-32bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037947" comment="libtool-64bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037948" comment="libtool-x86 less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037900" comment="libtool less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037913" comment="samba-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037949" comment="samba-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037914" comment="samba-client-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037950" comment="samba-client-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037951" comment="samba-client-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037915" comment="samba-client less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037916" comment="samba-doc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037917" comment="samba-krb-printing less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037918" comment="samba-pdb less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037952" comment="samba-python less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037919" comment="samba-vscan less than 0.3.6b-42.49"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037920" comment="samba-winbind-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037953" comment="samba-winbind-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037954" comment="samba-winbind-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037921" comment="samba-winbind less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037955" comment="samba-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037922" comment="samba less than 3.0.24-2.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1042</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1042" source="CVE"/>
	<description>
	Integer overflow in the exif_process_IFD_TAG function in exif.c in PHP before 4.3.11 may allow remote attackers to execute arbitrary code via an IFD tag that leads to a negative byte count.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1261</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1261" source="CVE"/>
	<description>
	Stack-based buffer overflow in the URL parsing function in Gaim before 1.3.0 allows remote attackers to execute arbitrary code via an instant message (IM) with a large URL.
	</description>
 </metadata>
<!-- f83d87195bba0229ac4b65c0cd41c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037827" comment="NetworkManager-devel less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037828" comment="NetworkManager-glib less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037829" comment="NetworkManager-gnome less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037832" comment="NetworkManager less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037928" comment="audit-devel less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037834" comment="audit-libs-32bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037929" comment="audit-libs-64bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037835" comment="audit-libs-python less than 1.2.9-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037930" comment="audit-libs-x86 less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037836" comment="audit-libs less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037837" comment="audit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037842" comment="cifs-mount less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037845" comment="dhcp-client less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037931" comment="dhcp-devel less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037932" comment="dhcp-relay less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037933" comment="dhcp-server less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037846" comment="dhcp less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037934" comment="gdb-32bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037935" comment="gdb-64bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037936" comment="gdb-x86 less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037858" comment="gdb less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037862" comment="glib2-32bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037937" comment="glib2-64bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037863" comment="glib2-devel less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037864" comment="glib2-doc less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037938" comment="glib2-x86 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037865" comment="glib2 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037867" comment="gnome-filesystem less than 0.1-261.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037873" comment="gstreamer010-plugins-base-32bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037939" comment="gstreamer010-plugins-base-64bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037875" comment="gstreamer010-plugins-base-doc less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037940" comment="gstreamer010-plugins-base-x86 less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037880" comment="gstreamer010-plugins-base less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037888" comment="libbeagle-32bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037941" comment="libbeagle-64bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037942" comment="libbeagle-x86 less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037890" comment="libbeagle less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037892" comment="libgail-gnome less than 1.1.3-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037893" comment="libgdiplus less than 1.2.2-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037943" comment="libmsrpc-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037944" comment="libmsrpc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037896" comment="libsmbclient-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037945" comment="libsmbclient-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037897" comment="libsmbclient-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037946" comment="libsmbclient-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037898" comment="libsmbclient less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037899" comment="libtool-32bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037947" comment="libtool-64bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037948" comment="libtool-x86 less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037900" comment="libtool less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037913" comment="samba-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037949" comment="samba-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037914" comment="samba-client-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037950" comment="samba-client-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037951" comment="samba-client-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037915" comment="samba-client less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037916" comment="samba-doc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037917" comment="samba-krb-printing less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037918" comment="samba-pdb less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037952" comment="samba-python less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037919" comment="samba-vscan less than 0.3.6b-42.49"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037920" comment="samba-winbind-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037953" comment="samba-winbind-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037954" comment="samba-winbind-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037921" comment="samba-winbind less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037955" comment="samba-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037922" comment="samba less than 3.0.24-2.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20051921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-1921</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-1921" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1921" source="CVE"/>
	<description>
	Eval injection vulnerability in PEAR XML_RPC 1.3.0 and earlier (aka XML-RPC or xmlrpc) and PHPXMLRPC (aka XML-RPC For PHP or php-xmlrpc) 1.1 and earlier, as used in products such as (1) WordPress, (2) Serendipity, (3) Drupal, (4) egroupware, (5) MailWatch, (6) TikiWiki, (7) phpWebSite, (8) Ampache, and others, allows remote attackers to execute arbitrary PHP code via an XML file, which is not properly sanitized before being used in an eval statement.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2498" source="CVE"/>
	<description>
	Eval injection vulnerability in PHPXMLRPC 1.1.1 and earlier (PEAR XML-RPC for PHP), as used in multiple products including (1) Drupal, (2) phpAdsNew, (3) phpPgAds, and (4) phpgroupware, allows remote attackers to execute arbitrary PHP code via certain nested XML tags in a PHP document that should not be nested, which are injected into an eval function call, a different vulnerability than CVE-2005-1921.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20052975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-2975</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-2975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975" source="CVE"/>
	<description>
	io-xpm.c in the gdk-pixbuf XPM image rendering library in GTK+ before 2.8.7 allows attackers to cause a denial of service (infinite loop) via a crafted XPM image with a large number of colors.
	</description>
 </metadata>
<!-- c0136d5f769f780ec791f2b7c698b64b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037768" comment="gtk2-devel-64bit less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037767" comment="gtk2-devel less than 2.8.11-0.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3353</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3353" source="CVE"/>
	<description>
	The exif_read_data function in the Exif module in PHP before 4.4.1 allows remote attackers to cause a denial of service (infinite loop) via a malformed JPEG image.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3388</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3388" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote attackers to inject arbitrary web script or HTML via a crafted URL with a "stacked array assignment."
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3389</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389" source="CVE"/>
	<description>
	The parse_str function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when called with only one parameter, allows remote attackers to enable the register_globals directive via inputs that cause a request to be terminated due to the memory_limit setting, which causes PHP to set an internal flag that enables register_globals and allows attackers to exploit vulnerabilities in PHP applications that would otherwise be protected.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3390</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390" source="CVE"/>
	<description>
	The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3391</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3391" source="CVE"/>
	<description>
	Multiple vulnerabilities in PHP before 4.4.1 allow remote attackers to bypass safe_mode and open_basedir restrictions via unknown attack vectors in (1) ext/curl and (2) ext/gd.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3392</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-3392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3392" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 4.4.1, when using the virtual function on Apache 2, allows remote attackers to bypass safe_mode and open_basedir directives.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20053510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-3510</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2005-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3510" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 to 5.5.11 allows remote attackers to cause a denial of service (CPU consumption) via a large number of simultaneous requests to list a web directory that has a large number of files.
	</description>
 </metadata>
<!-- 92960116ff6e91e1d8bc4b0cc8af4ea7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009039327" comment="tomcat5-admin-webapps less than 5.0.30-27.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039328" comment="tomcat5-webapps less than 5.0.30-27.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039329" comment="tomcat5 less than 5.0.30-27.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4095</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2005-4095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4095" source="CVE"/>
	<description>
	Directory traversal vulnerability in connector.php in the fckeditor2rc2 addon in DoceboLMS 2.0.4 allows remote attackers to list arbitrary files and directories via ".." sequences in the Type parameter in a GetFoldersAndFiles command.
	</description>
 </metadata>
<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20054881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2005-4881</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2005-4881" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4881" source="CVE"/>
	<description>
	The netlink subsystem in the Linux kernel 2.4.x before 2.4.37.6 and 2.6.x before 2.6.13-rc1 does not initialize certain padding fields in structures, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors, related to the (1) tc_fill_qdisc, (2) tcf_fill_node, (3) neightbl_fill_info, (4) neightbl_fill_param_info, (5) neigh_fill_info, (6) rtnetlink_fill_ifinfo, (7) rtnetlink_fill_iwinfo, (8) vif_delete, (9) ipmr_destroy_unres, (10) ipmr_cache_alloc_unres, (11) ipmr_cache_resolve, (12) inet6_fill_ifinfo, (13) tca_get_fill, (14) tca_action_flush, (15) tcf_add_notify, (16) tc_dump_action, (17) cbq_dump_police, (18) __nlmsg_put, (19) __rta_fill, (20) __rta_reserve, (21) inet6_fill_prefix, (22) rsvp_dump, and (23) cbq_dump_ovl functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20060996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-0996</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0996" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote attackers to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1017</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1017" source="CVE"/>
	<description>
	The c-client library 2000, 2001, or 2004 for PHP before 4.4.4 and 5.x before 5.1.5 do not check the (1) safe_mode or (2) open_basedir functions, and when used in applications that accept user-controlled input for the mailbox argument to the imap_open function, allow remote attackers to obtain access to an IMAP stream data structure and conduct unauthorized IMAP actions.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1490</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1490" source="CVE"/>
	<description>
	PHP before 5.1.3-RC1 might allow remote attackers to obtain portions of memory via crafted binary data sent to a script that processes user input in the html_entity_decode function and sends the encoded results back to the client, aka a "binary safety" issue.  NOTE: this issue has been referred to as a "memory leak," but it is an information leak that discloses memory contents.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1494</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1494" source="CVE"/>
	<description>
	Directory traversal vulnerability in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass open_basedir restrictions allows remote attackers to create files in arbitrary directories via the tempnam function.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1526</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1526" source="CVE"/>
	<description>
	Buffer overflow in the X render (Xrender) extension in X.org X server 6.8.0 up to allows attackers to cause a denial of service (crash), as demonstrated by the (1) XRenderCompositeTriStrip and (2) XRenderCompositeTriFan requests in the rendertest from XCB xcb/xcb-demo, which leads to an incorrect memory allocation due to a typo in an expression that uses a "&amp;" instead of a "*" operator. NOTE: the subject line of the original announcement used an incorrect CVE number for this issue.
	</description>
 </metadata>
<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20061991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-1991</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1991" source="CVE"/>
	<description>
	The substr_compare function in string.c in PHP 5.1.2 allows context-dependent attackers to cause a denial of service (memory access violation) via an out-of-bounds offset argument.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2162" source="CVE"/>
	<description>
	Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header.
	</description>
 </metadata>
<!-- 9c10b90f7e6bb67ac1cf9ea7e2039d39 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040016" comment="nagios-www less than 2.6-13.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040017" comment="nagios less than 2.6-13.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2450</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP1 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP1 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP1 for IPF</platform>
		<platform>SLE SDK 10 SP1 for X86-64</platform>
		<platform>SLE SDK 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2450" source="CVE"/>
	<description>
	auth.c in LibVNCServer 0.7.1 allows remote attackers to bypass authentication via a request in which the client specifies an insecure security type such as "Type 1 - None", which is accepted even if it is not offered by the server, a different issue than CVE-2006-2369.
	</description>
 </metadata>
<!-- 6eb818f0f4f89007776e2105593019ac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036678" comment="sles10-sp1-online-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040288" comment="LibVNCServer less than 0.8.2-31.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2563" source="CVE"/>
	<description>
	The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to bypass safe mode and read files via a file:// request containing null characters.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2660</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2660" source="CVE"/>
	<description>
	Buffer consumption vulnerability in the tempnam function in PHP 5.1.4 and 4.x before 4.4.3 allows local users to bypass restrictions and create PHP files with fixed names in other directories via a pathname argument longer than MAXPATHLEN, which prevents a unique string from being appended to the filename.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2916</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2916" source="CVE"/>
	<description>
	artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges.
	</description>
 </metadata>
<!-- d8a29c5ccebd97806baee81f19174d23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040545" comment="arts-32bit less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040599" comment="arts-64bit less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040546" comment="arts-devel less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040600" comment="arts-gmcop less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040601" comment="arts-x86 less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040547" comment="arts less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040548" comment="esound-32bit less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040602" comment="esound-64bit less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040549" comment="esound-devel less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040603" comment="esound-x86 less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040550" comment="esound less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040551" comment="fileshareset less than 2.0-84.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040552" comment="fontconfig-32bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040604" comment="fontconfig-64bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040553" comment="fontconfig-devel-32bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040605" comment="fontconfig-devel-64bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040554" comment="fontconfig-devel less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040606" comment="fontconfig-x86 less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040555" comment="fontconfig less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040557" comment="gtk-32bit less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040607" comment="gtk-64bit less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040558" comment="gtk-devel less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040608" comment="gtk-x86 less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040559" comment="gtk less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040561" comment="kdebase3-32bit less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040609" comment="kdebase3-64bit less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040562" comment="kdebase3-devel less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040610" comment="kdebase3-extra less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040563" comment="kdebase3-kdm less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040564" comment="kdebase3-ksysguardd less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040611" comment="kdebase3-nsplugin64 less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040565" comment="kdebase3-nsplugin less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040566" comment="kdebase3-samba less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040567" comment="kdebase3-session less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040612" comment="kdebase3-x86 less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040568" comment="kdebase3 less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040569" comment="kdelibs3-32bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040613" comment="kdelibs3-64bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040570" comment="kdelibs3-arts-32bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040614" comment="kdelibs3-arts-64bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040615" comment="kdelibs3-arts-x86 less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040571" comment="kdelibs3-arts less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040572" comment="kdelibs3-devel-doc less than 3.5.1-49.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040573" comment="kdelibs3-devel less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040574" comment="kdelibs3-doc less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040616" comment="kdelibs3-x86 less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040575" comment="kdelibs3 less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040576" comment="kdeutils3-devel less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040617" comment="kdeutils3-extra less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040577" comment="kdeutils3-laptop less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040578" comment="kdeutils3 less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040579" comment="libwnck-32bit less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040618" comment="libwnck-64bit less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040580" comment="libwnck-devel less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040619" comment="libwnck-x86 less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040581" comment="libwnck less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040620" comment="mysql-Max less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040582" comment="mysql-client less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040583" comment="mysql-devel less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040584" comment="mysql-shared-32bit less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040621" comment="mysql-shared-64bit less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040622" comment="mysql-shared-x86 less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040585" comment="mysql-shared less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040586" comment="mysql less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040587" comment="net-snmp-32bit less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040623" comment="net-snmp-64bit less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040624" comment="net-snmp-devel-64bit less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040588" comment="net-snmp-devel less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040625" comment="net-snmp-x86 less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040589" comment="net-snmp less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040590" comment="perl-SNMP less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040591" comment="qt3-32bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040626" comment="qt3-64bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040592" comment="qt3-devel-32bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040627" comment="qt3-devel-64bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040593" comment="qt3-devel-doc less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040628" comment="qt3-devel-tools-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040594" comment="qt3-devel-tools less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040595" comment="qt3-devel less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040596" comment="qt3-examples less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040629" comment="qt3-extensions less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040597" comment="qt3-man less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040630" comment="qt3-mysql-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040631" comment="qt3-mysql less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040632" comment="qt3-postgresql-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040633" comment="qt3-postgresql less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040634" comment="qt3-unixODBC-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040635" comment="qt3-unixODBC less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040636" comment="qt3-x86 less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040598" comment="qt3 less than 3.3.5-58.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2934</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2934" source="CVE"/>
	<description>
	SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2935</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2935" source="CVE"/>
	<description>
	The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20062936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-2936</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2936" source="CVE"/>
	<description>
	The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3018</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3018" source="CVE"/>
	<description>
	Unspecified vulnerability in the session extension functionality in PHP before 5.1.3 has unknown impact and attack vectors related to heap corruption.
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3121</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3121" source="CVE"/>
	<description>
	The peel_netstring function in cl_netstring.c in the heartbeat subsystem in High-Availability Linux before 1.2.5, and 2.0 before 2.0.7, allows remote attackers to cause a denial of service (crash) via the length parameter in a heartbeat message.
	</description>
 </metadata>
<!-- b3037d2ca788129b6fa88ada9f90c986 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040815" comment="drbd less than 0.7.22-42.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040816" comment="heartbeat-cmpi less than 2.0.8-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040817" comment="heartbeat-ldirectord less than 2.0.8-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040818" comment="heartbeat-pils less than 2.0.8-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040819" comment="heartbeat-stonith less than 2.0.8-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040820" comment="heartbeat less than 2.0.8-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040821" comment="ocfs2-tools less than 1.2.3-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040822" comment="ocfs2console less than 1.2.3-0.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3334</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3334" source="CVE"/>
	<description>
	Buffer overflow in the png_decompress_chunk function in pngrutil.c in libpng before 1.2.12 allows context-dependent attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors related to "chunk error processing," possibly involving the "chunk_name".
	</description>
 </metadata>
<!-- 40e287bc3683fa01255fe04db39e2e76 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040845" comment="libpng-devel-32bit less than 1.2.8-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040847" comment="libpng-devel-64bit less than 1.2.8-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040846" comment="libpng-devel less than 1.2.8-19.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3404</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3404" source="CVE"/>
	<description>
	Buffer overflow in the xcf_load_vector function in app/xcf/xcf-load.c for gimp before 2.2.12 allows user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XCF file with a large num_axes value in the VECTORS property.
	</description>
 </metadata>
<!-- 910453b56d92f11dc3441c5f3674ea54 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040930" comment="cairo-32bit less than 1.0.2-27.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041003" comment="cairo-64bit less than 1.0.2-27.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040931" comment="cairo-devel less than 1.0.2-27.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040932" comment="cairo-doc less than 1.0.2-27.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041004" comment="cairo-x86 less than 1.0.2-27.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040933" comment="cairo less than 1.0.2-27.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040934" comment="control-center2-devel less than 2.12.3-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040935" comment="control-center2 less than 2.12.3-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040936" comment="eel-32bit less than 2.12.2-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041005" comment="eel-64bit less than 2.12.2-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040937" comment="eel-devel less than 2.12.2-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041006" comment="eel-x86 less than 2.12.2-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040938" comment="eel less than 2.12.2-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040939" comment="evolution-data-server-32bit less than 1.6.0-43.53"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041007" comment="evolution-data-server-64bit less than 1.6.0-43.53"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040940" comment="evolution-data-server-devel less than 1.6.0-43.53"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041008" comment="evolution-data-server-x86 less than 1.6.0-43.53"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040941" comment="evolution-data-server less than 1.6.0-43.53"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040945" comment="gnome-applets-devel less than 2.12.2-51.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040946" comment="gnome-applets less than 2.12.2-51.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040947" comment="gnome-cups-manager-devel less than 0.32cvs20060120-33.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040948" comment="gnome-cups-manager less than 0.32cvs20060120-33.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040949" comment="gnome-desktop-32bit less than 2.12.2-25.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041009" comment="gnome-desktop-64bit less than 2.12.2-25.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040950" comment="gnome-desktop-devel less than 2.12.2-25.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041010" comment="gnome-desktop-x86 less than 2.12.2-25.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040951" comment="gnome-desktop less than 2.12.2-25.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040952" comment="gnome-keyring-32bit less than 0.4.6-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041011" comment="gnome-keyring-64bit less than 0.4.6-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040953" comment="gnome-keyring-devel less than 0.4.6-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041012" comment="gnome-keyring-x86 less than 0.4.6-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040954" comment="gnome-keyring less than 0.4.6-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040956" comment="gnome-main-menu less than 0.9.8-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040957" comment="gnome-menus-32bit less than 2.16.1-38.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041013" comment="gnome-menus-64bit less than 2.16.1-38.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040958" comment="gnome-menus-devel less than 2.16.1-38.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041014" comment="gnome-menus-x86 less than 2.16.1-38.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040959" comment="gnome-menus less than 2.16.1-38.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040960" comment="gnome-panel-nld-32bit less than 2.12.3-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041015" comment="gnome-panel-nld-64bit less than 2.12.3-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040962" comment="gnome-panel-nld-doc less than 2.12.3-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041016" comment="gnome-panel-nld-x86 less than 2.12.3-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040963" comment="gnome-panel-nld less than 2.12.3-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040964" comment="gnome-vfs2-32bit less than 2.12.2-58.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041017" comment="gnome-vfs2-64bit less than 2.12.2-58.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040965" comment="gnome-vfs2-devel less than 2.12.2-58.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040966" comment="gnome-vfs2-doc less than 2.12.2-58.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041018" comment="gnome-vfs2-x86 less than 2.12.2-58.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040967" comment="gnome-vfs2 less than 2.12.2-58.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040968" comment="gstreamer010-32bit less than 0.10.4-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041019" comment="gstreamer010-64bit less than 0.10.4-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040970" comment="gstreamer010-doc less than 0.10.4-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041020" comment="gstreamer010-x86 less than 0.10.4-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040971" comment="gstreamer010 less than 0.10.4-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040972" comment="gtk2-32bit less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041021" comment="gtk2-64bit less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037768" comment="gtk2-devel-64bit less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037767" comment="gtk2-devel less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040973" comment="gtk2-doc less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041022" comment="gtk2-x86 less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040974" comment="gtk2 less than 2.8.11-0.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040976" comment="gtkhtml2 less than 3.10.0-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040978" comment="libgnomedb-devel less than 1.3.91-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040979" comment="libgnomedb less than 1.3.91-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040980" comment="libgnomesu-devel less than 1.0.0-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040981" comment="libgnomesu less than 1.0.0-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040982" comment="libgnomeui-32bit less than 2.12.1-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041023" comment="libgnomeui-64bit less than 2.12.1-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040983" comment="libgnomeui-devel less than 2.12.1-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040984" comment="libgnomeui-doc less than 2.12.1-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041024" comment="libgnomeui-x86 less than 2.12.1-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040985" comment="libgnomeui less than 2.12.1-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040986" comment="libgsf-32bit less than 1.13.99-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041025" comment="libgsf-64bit less than 1.13.99-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040987" comment="libgsf-devel less than 1.13.99-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040988" comment="libgsf-doc less than 1.13.99-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040989" comment="libgsf-gnome less than 1.13.99-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041026" comment="libgsf-x86 less than 1.13.99-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040990" comment="libgsf less than 1.13.99-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040991" comment="libsoup-32bit less than 2.2.90-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041027" comment="libsoup-64bit less than 2.2.90-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040992" comment="libsoup-devel-32bit less than 2.2.90-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041028" comment="libsoup-devel-64bit less than 2.2.90-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040993" comment="libsoup-devel less than 2.2.90-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041029" comment="libsoup-x86 less than 2.2.90-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040994" comment="libsoup less than 2.2.90-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040995" comment="mozilla-nspr-32bit less than 4.6.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041030" comment="mozilla-nspr-64bit less than 4.6.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040996" comment="mozilla-nspr-devel less than 4.6.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041031" comment="mozilla-nspr-x86 less than 4.6.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040997" comment="mozilla-nspr less than 4.6.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040998" comment="nautilus-32bit less than 2.12.2-64.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041032" comment="nautilus-64bit less than 2.12.2-64.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040999" comment="nautilus-devel less than 2.12.2-64.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041033" comment="nautilus-x86 less than 2.12.2-64.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041000" comment="nautilus less than 2.12.2-64.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041001" comment="vte-devel less than 0.11.17-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041002" comment="vte less than 0.11.17-0.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3626</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3626" source="CVE"/>
	<description>
	Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3739</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3739" source="CVE"/>
	<description>
	Integer overflow in the CIDAFM function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted Adobe Font Metrics (AFM) files with a modified number of character metrics (StartCharMetrics), which leads to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a2735c6bf8dce53b13ee40593bb74c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041199" comment="OpenIPMI-devel less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041167" comment="OpenIPMI less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041200" comment="bootsplash-theme-SuSE-SLES less than 3.1-69.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041201" comment="ddrescue less than 1.13_0.0.6-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041169" comment="glibc-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041202" comment="glibc-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041170" comment="glibc-devel-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041203" comment="glibc-devel-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041171" comment="glibc-devel less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041172" comment="glibc-html less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041173" comment="glibc-i18ndata less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041174" comment="glibc-info less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041175" comment="glibc-locale-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041204" comment="glibc-locale-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041205" comment="glibc-locale-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041176" comment="glibc-locale less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041206" comment="glibc-profile-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041207" comment="glibc-profile-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041208" comment="glibc-profile-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041209" comment="glibc-profile less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041210" comment="glibc-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041177" comment="glibc less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041178" comment="grub less than 0.97-16.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041179" comment="ipmitool less than 1.8.9-2.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041180" comment="ivman less than 0.6.9-16.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041211" comment="ksh-devel less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041181" comment="ksh less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041182" comment="lvm2 less than 2.02.17-7.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041183" comment="nscd less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041212" comment="release-notes-sles less than 10-43.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041213" comment="sles-release less than 10-15.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041184" comment="timezone less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041185" comment="xorg-x11-Xnest less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041186" comment="xorg-x11-Xvfb less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041187" comment="xorg-x11-Xvnc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041214" comment="xorg-x11-doc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041188" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041189" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041190" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041191" comment="xorg-x11-fonts-scalable less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041192" comment="xorg-x11-fonts-syriac less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041193" comment="xorg-x11-libs-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041215" comment="xorg-x11-libs-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041216" comment="xorg-x11-libs-x86 less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041194" comment="xorg-x11-libs less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041195" comment="xorg-x11-man less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041217" comment="xorg-x11-sdk less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041196" comment="xorg-x11-server-glx less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041197" comment="xorg-x11-server less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041198" comment="xorg-x11 less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
	<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3740</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3740" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3740" source="CVE"/>
	<description>
	Integer overflow in the scan_cidfont function in X.Org 6.8.2 and XFree86 X server allows local users to execute arbitrary code via crafted (1) CMap and (2) CIDFont font data with modified item counts in the (a) begincodespacerange, (b) cidrange, and (c) notdefrange sections.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a2735c6bf8dce53b13ee40593bb74c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041199" comment="OpenIPMI-devel less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041167" comment="OpenIPMI less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041200" comment="bootsplash-theme-SuSE-SLES less than 3.1-69.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041201" comment="ddrescue less than 1.13_0.0.6-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041169" comment="glibc-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041202" comment="glibc-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041170" comment="glibc-devel-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041203" comment="glibc-devel-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041171" comment="glibc-devel less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041172" comment="glibc-html less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041173" comment="glibc-i18ndata less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041174" comment="glibc-info less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041175" comment="glibc-locale-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041204" comment="glibc-locale-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041205" comment="glibc-locale-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041176" comment="glibc-locale less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041206" comment="glibc-profile-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041207" comment="glibc-profile-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041208" comment="glibc-profile-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041209" comment="glibc-profile less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041210" comment="glibc-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041177" comment="glibc less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041178" comment="grub less than 0.97-16.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041179" comment="ipmitool less than 1.8.9-2.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041180" comment="ivman less than 0.6.9-16.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041211" comment="ksh-devel less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041181" comment="ksh less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041182" comment="lvm2 less than 2.02.17-7.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041183" comment="nscd less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041212" comment="release-notes-sles less than 10-43.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041213" comment="sles-release less than 10-15.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041184" comment="timezone less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041185" comment="xorg-x11-Xnest less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041186" comment="xorg-x11-Xvfb less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041187" comment="xorg-x11-Xvnc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041214" comment="xorg-x11-doc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041188" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041189" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041190" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041191" comment="xorg-x11-fonts-scalable less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041192" comment="xorg-x11-fonts-syriac less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041193" comment="xorg-x11-libs-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041215" comment="xorg-x11-libs-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041216" comment="xorg-x11-libs-x86 less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041194" comment="xorg-x11-libs less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041195" comment="xorg-x11-man less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041217" comment="xorg-x11-sdk less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041196" comment="xorg-x11-server-glx less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041197" comment="xorg-x11-server less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041198" comment="xorg-x11 less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
	<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3745</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3745" source="CVE"/>
	<description>
	Unspecified vulnerability in the sctp_make_abort_user function in the SCTP implementation in Linux 2.6.x before 2.6.17.10 and 2.4.23 up to 2.4.33 allows local users to cause a denial of service (panic) and possibly gain root privileges via unknown attack vectors.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3747</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-3747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3747" source="CVE"/>
	<description>
	Off-by-one error in the ldap scheme handling in the Rewrite module (mod_rewrite) in Apache 1.3 from 1.3.28, 2.0.46 and other versions before 2.0.59, and 2.2, when RewriteEngine is enabled, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted URLs that are not properly handled using certain rewrite rules.
	</description>
 </metadata>
<!-- 162652df7a68f660e524842dea5cd9f2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20063835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-3835</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2006-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3835" source="CVE"/>
	<description>
	Apache Tomcat 5 before 5.5.17 allows remote attackers to list directories via a semicolon (;) preceding a filename with a mapped extension, as demonstrated by URLs ending with /;index.jsp and /;help.do.
	</description>
 </metadata>
<!-- 92960116ff6e91e1d8bc4b0cc8af4ea7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009039327" comment="tomcat5-admin-webapps less than 5.0.30-27.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039328" comment="tomcat5-webapps less than 5.0.30-27.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039329" comment="tomcat5 less than 5.0.30-27.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4145</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4145" source="CVE"/>
	<description>
	The Universal Disk Format (UDF) filesystem driver in Linux kernel 2.6.17 and earlier allows local users to cause a denial of service (hang and crash) via certain operations involving truncated files, as demonstrated via the dd command.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4340</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4340" source="CVE"/>
	<description>
	Mozilla Network Security Service (NSS) library before 3.11.3, as used in Mozilla Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5, when using an RSA key with exponent 3, does not properly handle extra data in a signature, which allows remote attackers to forge signatures for SSL/TLS and email certificates, a similar vulnerability to CVE-2006-4339.  NOTE: on 20061107, Mozilla released an advisory stating that these versions were not completely patched by MFSA2006-60. The newer fixes for 1.5.0.7 are covered by CVE-2006-5462.
	</description>
 </metadata>
<!-- f2ed7bea62889b94eeb1394136e19e23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041543" comment="MozillaFirefox-translations less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041544" comment="MozillaFirefox less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041545" comment="dejavu less than 2.9-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041546" comment="desktop-data-NLD less than 10.1-31.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041547" comment="mozilla-nss-32bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041567" comment="mozilla-nss-64bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041548" comment="mozilla-nss-devel less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041568" comment="mozilla-nss-x86 less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041550" comment="mozilla-nss less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041569" comment="openmotif-demo less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041570" comment="openmotif-devel-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041571" comment="openmotif-devel-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041572" comment="openmotif-devel less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041551" comment="openmotif-libs-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041573" comment="openmotif-libs-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041574" comment="openmotif-libs-x86 less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041552" comment="openmotif-libs less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041575" comment="openmotif less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041553" comment="sax2-gui less than 1.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041554" comment="sax2-ident less than 1.7-125.38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041576" comment="sax2-libsax-devel less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041577" comment="sax2-libsax-java less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041556" comment="sax2-libsax-perl less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041578" comment="sax2-libsax-python less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041557" comment="sax2-libsax less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041558" comment="sax2-tools less than 2.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041559" comment="sax2 less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041560" comment="tightvnc less than 1.2.9-201.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041561" comment="xdg-menu less than 0.2-66.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041562" comment="xorg-x11-driver-video-nvidia less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041563" comment="xorg-x11-driver-video less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041564" comment="yast2-control-center less than 2.13.10-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041565" comment="yast2-qt less than 2.13.82-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041566" comment="yast2-x11 less than 2.13.13-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4538</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4538" source="CVE"/>
	<description>
	Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4572</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4572" source="CVE"/>
	<description>
	ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka "ip6_tables protocol bypass bug;" and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka "ip6_tables extension header bypass bug."
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4811</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4811" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4811" source="CVE"/>
	<description>
	Integer overflow in Qt 3.3 before 3.3.7, 4.1 before 4.1.5, and 4.2 before 4.2.1, as used in the KDE khtml library, kdelibs 3.1.3, and possibly other packages, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted pixmap image.
	</description>
 </metadata>
<!-- d8a29c5ccebd97806baee81f19174d23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040545" comment="arts-32bit less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040599" comment="arts-64bit less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040546" comment="arts-devel less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040600" comment="arts-gmcop less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040601" comment="arts-x86 less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040547" comment="arts less than 1.5.1-15.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040548" comment="esound-32bit less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040602" comment="esound-64bit less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040549" comment="esound-devel less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040603" comment="esound-x86 less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040550" comment="esound less than 0.2.36-19.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040551" comment="fileshareset less than 2.0-84.51"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040552" comment="fontconfig-32bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040604" comment="fontconfig-64bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040553" comment="fontconfig-devel-32bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040605" comment="fontconfig-devel-64bit less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040554" comment="fontconfig-devel less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040606" comment="fontconfig-x86 less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040555" comment="fontconfig less than 2.3.94-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040557" comment="gtk-32bit less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040607" comment="gtk-64bit less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040558" comment="gtk-devel less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040608" comment="gtk-x86 less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040559" comment="gtk less than 1.2.10-907.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040561" comment="kdebase3-32bit less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040609" comment="kdebase3-64bit less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040562" comment="kdebase3-devel less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040610" comment="kdebase3-extra less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040563" comment="kdebase3-kdm less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040564" comment="kdebase3-ksysguardd less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040611" comment="kdebase3-nsplugin64 less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040565" comment="kdebase3-nsplugin less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040566" comment="kdebase3-samba less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040567" comment="kdebase3-session less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040612" comment="kdebase3-x86 less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040568" comment="kdebase3 less than 3.5.1-69.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040569" comment="kdelibs3-32bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040613" comment="kdelibs3-64bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040570" comment="kdelibs3-arts-32bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040614" comment="kdelibs3-arts-64bit less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040615" comment="kdelibs3-arts-x86 less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040571" comment="kdelibs3-arts less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040572" comment="kdelibs3-devel-doc less than 3.5.1-49.34"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040573" comment="kdelibs3-devel less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040574" comment="kdelibs3-doc less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040616" comment="kdelibs3-x86 less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040575" comment="kdelibs3 less than 3.5.1-49.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040576" comment="kdeutils3-devel less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040617" comment="kdeutils3-extra less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040577" comment="kdeutils3-laptop less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040578" comment="kdeutils3 less than 3.5.1-25.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040579" comment="libwnck-32bit less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040618" comment="libwnck-64bit less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040580" comment="libwnck-devel less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040619" comment="libwnck-x86 less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040581" comment="libwnck less than 2.12.3-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040620" comment="mysql-Max less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040582" comment="mysql-client less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040583" comment="mysql-devel less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040584" comment="mysql-shared-32bit less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040621" comment="mysql-shared-64bit less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040622" comment="mysql-shared-x86 less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040585" comment="mysql-shared less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040586" comment="mysql less than 5.0.26-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040587" comment="net-snmp-32bit less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040623" comment="net-snmp-64bit less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040624" comment="net-snmp-devel-64bit less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040588" comment="net-snmp-devel less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040625" comment="net-snmp-x86 less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040589" comment="net-snmp less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040590" comment="perl-SNMP less than 5.3.0.1-25.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040591" comment="qt3-32bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040626" comment="qt3-64bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040592" comment="qt3-devel-32bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040627" comment="qt3-devel-64bit less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040593" comment="qt3-devel-doc less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040628" comment="qt3-devel-tools-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040594" comment="qt3-devel-tools less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040595" comment="qt3-devel less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040596" comment="qt3-examples less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040629" comment="qt3-extensions less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040597" comment="qt3-man less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040630" comment="qt3-mysql-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040631" comment="qt3-mysql less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040632" comment="qt3-postgresql-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040633" comment="qt3-postgresql less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040634" comment="qt3-unixODBC-64bit less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040635" comment="qt3-unixODBC less than 3.3.5-58.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040636" comment="qt3-x86 less than 3.3.5-58.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040598" comment="qt3 less than 3.3.5-58.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20064812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-4812</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-4812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4812" source="CVE"/>
	<description>
	Integer overflow in PHP 5 up to 5.1.6 and 4 before 4.3.0 allows remote attackers to execute arbitrary code via an argument to the unserialize PHP function with a large value for the number of array elements, which triggers the overflow in the Zend Engine ecalloc function (Zend/zend_alloc.c).
	</description>
 </metadata>
<!-- af9af93be33822106acb8114367d0591 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5051</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5051" source="CVE"/>
	<description>
	Signal handler race condition in OpenSSH before 4.4 allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code if GSSAPI authentication is enabled, via unspecified vectors that lead to a double-free.
	</description>
 </metadata>
<!-- b7c2f798262596164eb287796a54bdb1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041840" comment="CheckHardware less than 0.1-988.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041841" comment="aaa_base less than 10-12.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041842" comment="acl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041843" comment="at less than 3.1.8-921.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041844" comment="attr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041845" comment="autofs less than 4.1.4-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041846" comment="autoyast2-installation less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041847" comment="autoyast2 less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042037" comment="bash-x86 less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041848" comment="bash less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042038" comment="bind-chrootenv less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042039" comment="bind-devel-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042040" comment="bind-devel less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042041" comment="bind-doc less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041849" comment="bind-libs-32bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042042" comment="bind-libs-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042043" comment="bind-libs-x86 less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041850" comment="bind-libs less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041851" comment="bind-utils less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042044" comment="bind less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041852" comment="binutils-32bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042045" comment="binutils-64bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042046" comment="binutils-x86 less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041853" comment="binutils less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042047" comment="coreutils-x86 less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041854" comment="coreutils less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041855" comment="cpio less than 2.6-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041856" comment="cron less than 4.1-45.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041857" comment="dbus-1-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042048" comment="dbus-1-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041858" comment="dbus-1-devel less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041859" comment="dbus-1-glib-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042049" comment="dbus-1-glib-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042050" comment="dbus-1-glib-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041860" comment="dbus-1-glib less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041861" comment="dbus-1-gtk less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042051" comment="dbus-1-java less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041862" comment="dbus-1-mono less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041863" comment="dbus-1-python less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041864" comment="dbus-1-qt3-32bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042052" comment="dbus-1-qt3-64bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041865" comment="dbus-1-qt3-devel less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042053" comment="dbus-1-qt3-x86 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041866" comment="dbus-1-qt3 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041867" comment="dbus-1-x11 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042054" comment="dbus-1-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041868" comment="dbus-1 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041869" comment="desktop-translations less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041870" comment="diffutils less than 2.8.7-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041871" comment="dmraid less than 0.99_1.0.0rc13-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041872" comment="dosfstools less than 2.11-15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041873" comment="e2fsprogs-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042055" comment="e2fsprogs-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041874" comment="e2fsprogs-devel-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042056" comment="e2fsprogs-devel-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041875" comment="e2fsprogs-devel less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042057" comment="e2fsprogs-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041876" comment="e2fsprogs less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041877" comment="filesystem less than 10-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041878" comment="findutils-locate less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041879" comment="findutils less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041880" comment="grep less than 2.5.1a-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041881" comment="hal-32bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042058" comment="hal-64bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041882" comment="hal-devel less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041883" comment="hal-gnome less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042059" comment="hal-x86 less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041884" comment="hal less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041885" comment="hwinfo-devel less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041886" comment="hwinfo less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041887" comment="insserv less than 1.04.0-20.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041888" comment="iputils less than ss021109-167.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041889" comment="klogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041890" comment="krb5-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042060" comment="krb5-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042061" comment="krb5-apps-clients less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042062" comment="krb5-apps-servers less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041891" comment="krb5-client less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041892" comment="krb5-devel-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042063" comment="krb5-devel-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041893" comment="krb5-devel less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042064" comment="krb5-doc less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042065" comment="krb5-server less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042066" comment="krb5-x86 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041894" comment="krb5 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042067" comment="ldapcpplib-devel less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041895" comment="ldapcpplib less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041896" comment="libacl-32bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042068" comment="libacl-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042069" comment="libacl-devel-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041897" comment="libacl-devel less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042070" comment="libacl-x86 less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041898" comment="libacl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041899" comment="libattr-32bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042071" comment="libattr-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042072" comment="libattr-devel-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041900" comment="libattr-devel less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042073" comment="libattr-x86 less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041901" comment="libattr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041902" comment="libcom_err-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042074" comment="libcom_err-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042075" comment="libcom_err-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041903" comment="libcom_err less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042076" comment="liby2util-devel less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041904" comment="liby2util less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042077" comment="libzypp-devel less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041905" comment="libzypp-zmd-backend less than 7.1.1.0_0.8-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041906" comment="libzypp less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042078" comment="lilo less than 10.1.22-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041907" comment="lilo less than 22.7-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041908" comment="limal-bootloader less than 1.1.50-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041909" comment="limal-perl less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041910" comment="limal less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041911" comment="mailx less than 11.25-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041912" comment="mcelog less than 0.7-2.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041913" comment="mdadm less than 2.6-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041914" comment="microcode_ctl less than 1.15-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041915" comment="mkinitrd less than 1.2-106.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041916" comment="module-init-tools less than 3.2.2-32.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041917" comment="multipath-tools less than 0.4.7-34.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041918" comment="ncurses-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042079" comment="ncurses-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041919" comment="ncurses-devel-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042080" comment="ncurses-devel-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041920" comment="ncurses-devel less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042081" comment="ncurses-x86 less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041921" comment="ncurses less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041922" comment="nfs-utils less than 1.0.7-36.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041923" comment="nfsidmap less than 0.12-16.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042082" comment="openldap2-back-meta less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042083" comment="openldap2-back-meta less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042084" comment="openldap2-back-perl less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042085" comment="openldap2-back-perl less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041924" comment="openldap2-client-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042086" comment="openldap2-client-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042087" comment="openldap2-client-x86 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041925" comment="openldap2-client less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041926" comment="openldap2-devel-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042088" comment="openldap2-devel-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041927" comment="openldap2-devel less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041928" comment="openldap2 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042089" comment="openldap2 less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042090" comment="openssh-askpass-gnome less than 4.2p1-18.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041929" comment="openssh-askpass less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041930" comment="openssh less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041931" comment="pam-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042091" comment="pam-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042092" comment="pam-devel-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042093" comment="pam-devel-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041932" comment="pam-devel less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041933" comment="pam-modules-32bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042094" comment="pam-modules-64bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042095" comment="pam-modules-x86 less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041934" comment="pam-modules less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042096" comment="pam-x86 less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041935" comment="pam less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041936" comment="parted-32bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042097" comment="parted-64bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042098" comment="parted-devel less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042099" comment="parted-x86 less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041937" comment="parted less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042100" comment="pciutils-devel-32bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042101" comment="pciutils-devel-64bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042102" comment="pciutils-devel less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041938" comment="pciutils less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041939" comment="pcsc-lite-devel less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041940" comment="pcsc-lite less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041941" comment="perl-Bootloader less than 0.4.15-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041942" comment="permissions less than 2007.2.15-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041943" comment="popt-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042103" comment="popt-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041944" comment="popt-devel-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042104" comment="popt-devel-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041945" comment="popt-devel less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042105" comment="popt-x86 less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041946" comment="popt less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041947" comment="portmap less than 5beta-749.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041948" comment="postfix less than 2.2.9-10.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042106" comment="powersave-devel less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041949" comment="powersave-libs-32bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042107" comment="powersave-libs-64bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042108" comment="powersave-libs-x86 less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041950" comment="powersave-libs less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041951" comment="powersave less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041952" comment="procinfo less than 18-55.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041953" comment="pwdutils less than 3.0.7.1-17.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041954" comment="readline-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042109" comment="readline-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041955" comment="readline-devel-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042110" comment="readline-devel-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041956" comment="readline-devel less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042111" comment="readline-x86 less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041957" comment="readline less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041958" comment="reiserfs less than 3.6.19-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041959" comment="rpm-devel less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041960" comment="rpm-python less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041961" comment="rpm less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041962" comment="rug less than 7.2.0.0-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041964" comment="scpm less than 1.1.3-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041965" comment="screen less than 4.0.2-62.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041966" comment="scsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041967" comment="sed less than 4.1.4-17.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041969" comment="sudo less than 1.6.8p12-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041970" comment="suseRegister less than 1.2-9.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041971" comment="sysconfig less than 0.50.9-13.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041972" comment="sysfsutils-32bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042112" comment="sysfsutils-64bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042113" comment="sysfsutils-x86 less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041973" comment="sysfsutils less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041974" comment="syslinux less than 3.11-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042114" comment="syslogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041975" comment="sysvinit less than 2.86-21.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041976" comment="terminfo less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041977" comment="udev less than 085-30.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041978" comment="ulimit less than 1.1-146.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041979" comment="update-desktop-files less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041980" comment="util-linux less than 2.12r-35.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041981" comment="wireless-tools less than 28pre13-22.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042115" comment="xfsprogs-devel less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041982" comment="xfsprogs less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042116" comment="xntp-doc less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041983" comment="xntp less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042117" comment="xscsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041984" comment="yast2-backup less than 2.13.5-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041985" comment="yast2-bootloader less than 2.13.97-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042118" comment="yast2-core-devel less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041986" comment="yast2-core less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041987" comment="yast2-country less than 2.13.52-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042119" comment="yast2-devel less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041988" comment="yast2-firewall less than 2.13.15-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041989" comment="yast2-hardware-detection less than 2.13.7-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041990" comment="yast2-inetd less than 2.13.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041991" comment="yast2-installation less than 2.13.192-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041992" comment="yast2-irda less than 2.13.3-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041993" comment="yast2-kerberos-client less than 2.13.11-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041994" comment="yast2-ldap-client less than 2.13.27-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041995" comment="yast2-ldap less than 2.13.5-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041996" comment="yast2-mail-aliases less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041997" comment="yast2-mail less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041998" comment="yast2-ncurses less than 2.13.66-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041999" comment="yast2-network less than 2.13.98-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042000" comment="yast2-nfs-client less than 2.13.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042001" comment="yast2-nis-client less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042002" comment="yast2-ntp-client less than 2.13.17-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042003" comment="yast2-online-update-frontend less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042004" comment="yast2-online-update less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042005" comment="yast2-packager less than 2.13.175-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042006" comment="yast2-pam less than 2.13.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042007" comment="yast2-perl-bindings less than 2.13.11-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042008" comment="yast2-pkg-bindings less than 2.13.117-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042009" comment="yast2-power-management less than 2.13.9-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042010" comment="yast2-powertweak less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042011" comment="yast2-printer less than 2.13.32-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042012" comment="yast2-profile-manager less than 2.13.6-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042013" comment="yast2-repair less than 2.13.10-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042014" comment="yast2-restore less than 2.13.2-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042015" comment="yast2-runlevel less than 2.13.11-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042016" comment="yast2-samba-client less than 2.13.36-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042017" comment="yast2-schema less than 2.13.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042018" comment="yast2-security less than 2.13.7-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042019" comment="yast2-slp less than 2.13.4-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042120" comment="yast2-storage-devel less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042121" comment="yast2-storage-evms less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042020" comment="yast2-storage-lib less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042021" comment="yast2-storage less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042022" comment="yast2-support less than 2.13.6-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042023" comment="yast2-sysconfig less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042024" comment="yast2-theme-NLD less than 0.4.5-3.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042025" comment="yast2-trans-stats less than 2.11.0-21.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042026" comment="yast2-transfer less than 2.13.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042027" comment="yast2-tune less than 2.13.12-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042029" comment="yast2-update less than 2.13.52-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042030" comment="yast2-users less than 2.13.55-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042031" comment="yast2-vm less than 2.13.77-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042032" comment="yast2-xml less than 2.13.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042033" comment="yast2 less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042122" comment="zmd-devel less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042034" comment="zmd-inventory less than 7.2.0-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042035" comment="zmd less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042036" comment="zypper less than 0.6.17-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5170" source="CVE"/>
	<description>
	pam_ldap in nss_ldap on Red Hat Enterprise Linux 4, Fedora Core 3 and earlier, and possibly other distributions does not return an error condition when an LDAP directory server responds with a PasswordPolicyResponse control response, which causes the pam_authenticate function to return a success code even if authentication has failed, as originally reported for xscreensaver.
	</description>
 </metadata>
<!-- a0d56ea96b27afc53254f8945a8fc150 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042151" comment="nss_ldap-32bit less than 246-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042155" comment="nss_ldap-64bit less than 246-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042156" comment="nss_ldap-x86 less than 246-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042152" comment="nss_ldap less than 246-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042153" comment="pam_ldap-32bit less than 180-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042157" comment="pam_ldap-64bit less than 180-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042158" comment="pam_ldap-x86 less than 180-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042154" comment="pam_ldap less than 180-13.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5330</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5330" source="CVE"/>
	<description>
	CRLF injection vulnerability in Adobe Flash Player plugin 9.0.16 and earlier for Windows, 7.0.63 and earlier for Linux, 7.x before 7.0 r67 for Solaris, and before 9.0.28.0 for Mac OS X, allows remote attackers to modify HTTP headers of client requests and conduct HTTP Request Splitting attacks via CRLF sequences in arguments to the ActionScript functions (1) XML.addRequestHeader and (2) XML.contentType.  NOTE: the flexibility of the attack varies depending on the type of web browser being used.
	</description>
 </metadata>
<!-- 1867ef9a9f6037b1364b4c0e91ac87a0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009042160" comment="NetworkManager-kde less than 0.1r588481-1.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042194" comment="kdenetwork3-IRC less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042179" comment="kdenetwork3-InstantMessenger less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042195" comment="kdenetwork3-dialup less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042196" comment="kdenetwork3-lan less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042197" comment="kdenetwork3-lisa less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042180" comment="kdenetwork3-news less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042198" comment="kdenetwork3-query less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042181" comment="kdenetwork3-vnc less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042199" comment="kdenetwork3-wireless less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042182" comment="kdenetwork3 less than 3.5.1-32.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042183" comment="kdepim3-devel less than 3.5.1-41.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042184" comment="kdepim3-kpilot less than 3.5.1-41.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042186" comment="kdepim3-networkstatus less than 3.5.1-41.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042187" comment="kdepim3-sync less than 3.5.1-41.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042200" comment="kdepim3-time-management less than 3.5.1-41.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042188" comment="kdepim3 less than 3.5.1-41.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042190" comment="kinternet less than 0.75-19.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5465</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5465" source="CVE"/>
	<description>
	Buffer overflow in PHP before 5.2.0 allows remote attackers to execute arbitrary code via crafted UTF-8 inputs to the (1) htmlentities or (2) htmlspecialchars functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 162652df7a68f660e524842dea5cd9f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
		</criteria>
	</criteria>
	<!-- af9af93be33822106acb8114367d0591 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5619</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5619" source="CVE"/>
	<description>
	The seqfile handling (ip6fl_get_n function in ip6_flowlabel.c) in Linux kernel 2.6 up to 2.6.18-stable allows local users to cause a denial of service (hang or oops) via unspecified manipulations that trigger an infinite loop while searching for flowlabels.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5751</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5751" source="CVE"/>
	<description>
	Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.
	</description>
 </metadata>
<!-- 753294d78b12c46523f2a5e3815690d3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040637" comment="device-mapper-32bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040654" comment="device-mapper-64bit less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040655" comment="device-mapper-x86 less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040638" comment="device-mapper less than 1.02.13-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040639" comment="gfxboot less than 3.2.38-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040641" comment="kernel-bigsmp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040656" comment="kernel-debug less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040642" comment="kernel-default less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040657" comment="kernel-iseries64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040658" comment="kernel-kdump less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040659" comment="kernel-ppc64 less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040643" comment="kernel-smp less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040644" comment="kernel-source less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040645" comment="kernel-syms less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040646" comment="kernel-xen less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040647" comment="kernel-xenpae less than 2.6.16.46-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040660" comment="lkcdutils-netdump-server less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040648" comment="lkcdutils less than 7.0.1-22.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040649" comment="ltrace-32bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040661" comment="ltrace-64bit less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040650" comment="ltrace less than 0.4-31.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040652" comment="rsync less than 2.6.8-36.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040653" comment="sysstat less than 6.0.2-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5793</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5793" source="CVE"/>
	<description>
	The sPLT chunk handling code (png_set_sPLT function in pngset.c) in libpng 1.0.6 through 1.2.12 uses a sizeof operator on the wrong data type, which allows context-dependent attackers to cause a denial of service (crash) via malformed sPLT chunks that trigger an out-of-bounds read.
	</description>
 </metadata>
<!-- 40e287bc3683fa01255fe04db39e2e76 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009040845" comment="libpng-devel-32bit less than 1.2.8-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040847" comment="libpng-devel-64bit less than 1.2.8-19.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009040846" comment="libpng-devel less than 1.2.8-19.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5794</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5794" source="CVE"/>
	<description>
	Unspecified vulnerability in the sshd Privilege Separation Monitor in OpenSSH before 4.5 causes weaker verification that authentication has been successful, which might allow attackers to bypass authentication. NOTE: as of 20061108, it is believed that this issue is only exploitable by leveraging vulnerabilities in the unprivileged process, which are not known to exist.
	</description>
 </metadata>
<!-- b7c2f798262596164eb287796a54bdb1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041840" comment="CheckHardware less than 0.1-988.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041841" comment="aaa_base less than 10-12.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041842" comment="acl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041843" comment="at less than 3.1.8-921.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041844" comment="attr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041845" comment="autofs less than 4.1.4-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041846" comment="autoyast2-installation less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041847" comment="autoyast2 less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042037" comment="bash-x86 less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041848" comment="bash less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042038" comment="bind-chrootenv less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042039" comment="bind-devel-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042040" comment="bind-devel less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042041" comment="bind-doc less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041849" comment="bind-libs-32bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042042" comment="bind-libs-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042043" comment="bind-libs-x86 less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041850" comment="bind-libs less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041851" comment="bind-utils less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042044" comment="bind less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041852" comment="binutils-32bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042045" comment="binutils-64bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042046" comment="binutils-x86 less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041853" comment="binutils less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042047" comment="coreutils-x86 less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041854" comment="coreutils less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041855" comment="cpio less than 2.6-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041856" comment="cron less than 4.1-45.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041857" comment="dbus-1-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042048" comment="dbus-1-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041858" comment="dbus-1-devel less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041859" comment="dbus-1-glib-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042049" comment="dbus-1-glib-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042050" comment="dbus-1-glib-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041860" comment="dbus-1-glib less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041861" comment="dbus-1-gtk less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042051" comment="dbus-1-java less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041862" comment="dbus-1-mono less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041863" comment="dbus-1-python less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041864" comment="dbus-1-qt3-32bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042052" comment="dbus-1-qt3-64bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041865" comment="dbus-1-qt3-devel less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042053" comment="dbus-1-qt3-x86 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041866" comment="dbus-1-qt3 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041867" comment="dbus-1-x11 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042054" comment="dbus-1-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041868" comment="dbus-1 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041869" comment="desktop-translations less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041870" comment="diffutils less than 2.8.7-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041871" comment="dmraid less than 0.99_1.0.0rc13-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041872" comment="dosfstools less than 2.11-15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041873" comment="e2fsprogs-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042055" comment="e2fsprogs-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041874" comment="e2fsprogs-devel-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042056" comment="e2fsprogs-devel-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041875" comment="e2fsprogs-devel less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042057" comment="e2fsprogs-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041876" comment="e2fsprogs less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041877" comment="filesystem less than 10-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041878" comment="findutils-locate less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041879" comment="findutils less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041880" comment="grep less than 2.5.1a-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041881" comment="hal-32bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042058" comment="hal-64bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041882" comment="hal-devel less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041883" comment="hal-gnome less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042059" comment="hal-x86 less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041884" comment="hal less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041885" comment="hwinfo-devel less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041886" comment="hwinfo less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041887" comment="insserv less than 1.04.0-20.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041888" comment="iputils less than ss021109-167.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041889" comment="klogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041890" comment="krb5-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042060" comment="krb5-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042061" comment="krb5-apps-clients less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042062" comment="krb5-apps-servers less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041891" comment="krb5-client less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041892" comment="krb5-devel-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042063" comment="krb5-devel-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041893" comment="krb5-devel less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042064" comment="krb5-doc less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042065" comment="krb5-server less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042066" comment="krb5-x86 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041894" comment="krb5 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042067" comment="ldapcpplib-devel less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041895" comment="ldapcpplib less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041896" comment="libacl-32bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042068" comment="libacl-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042069" comment="libacl-devel-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041897" comment="libacl-devel less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042070" comment="libacl-x86 less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041898" comment="libacl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041899" comment="libattr-32bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042071" comment="libattr-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042072" comment="libattr-devel-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041900" comment="libattr-devel less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042073" comment="libattr-x86 less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041901" comment="libattr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041902" comment="libcom_err-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042074" comment="libcom_err-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042075" comment="libcom_err-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041903" comment="libcom_err less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042076" comment="liby2util-devel less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041904" comment="liby2util less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042077" comment="libzypp-devel less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041905" comment="libzypp-zmd-backend less than 7.1.1.0_0.8-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041906" comment="libzypp less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042078" comment="lilo less than 10.1.22-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041907" comment="lilo less than 22.7-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041908" comment="limal-bootloader less than 1.1.50-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041909" comment="limal-perl less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041910" comment="limal less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041911" comment="mailx less than 11.25-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041912" comment="mcelog less than 0.7-2.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041913" comment="mdadm less than 2.6-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041914" comment="microcode_ctl less than 1.15-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041915" comment="mkinitrd less than 1.2-106.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041916" comment="module-init-tools less than 3.2.2-32.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041917" comment="multipath-tools less than 0.4.7-34.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041918" comment="ncurses-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042079" comment="ncurses-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041919" comment="ncurses-devel-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042080" comment="ncurses-devel-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041920" comment="ncurses-devel less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042081" comment="ncurses-x86 less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041921" comment="ncurses less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041922" comment="nfs-utils less than 1.0.7-36.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041923" comment="nfsidmap less than 0.12-16.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042082" comment="openldap2-back-meta less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042083" comment="openldap2-back-meta less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042084" comment="openldap2-back-perl less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042085" comment="openldap2-back-perl less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041924" comment="openldap2-client-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042086" comment="openldap2-client-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042087" comment="openldap2-client-x86 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041925" comment="openldap2-client less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041926" comment="openldap2-devel-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042088" comment="openldap2-devel-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041927" comment="openldap2-devel less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041928" comment="openldap2 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042089" comment="openldap2 less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042090" comment="openssh-askpass-gnome less than 4.2p1-18.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041929" comment="openssh-askpass less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041930" comment="openssh less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041931" comment="pam-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042091" comment="pam-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042092" comment="pam-devel-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042093" comment="pam-devel-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041932" comment="pam-devel less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041933" comment="pam-modules-32bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042094" comment="pam-modules-64bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042095" comment="pam-modules-x86 less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041934" comment="pam-modules less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042096" comment="pam-x86 less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041935" comment="pam less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041936" comment="parted-32bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042097" comment="parted-64bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042098" comment="parted-devel less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042099" comment="parted-x86 less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041937" comment="parted less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042100" comment="pciutils-devel-32bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042101" comment="pciutils-devel-64bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042102" comment="pciutils-devel less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041938" comment="pciutils less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041939" comment="pcsc-lite-devel less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041940" comment="pcsc-lite less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041941" comment="perl-Bootloader less than 0.4.15-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041942" comment="permissions less than 2007.2.15-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041943" comment="popt-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042103" comment="popt-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041944" comment="popt-devel-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042104" comment="popt-devel-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041945" comment="popt-devel less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042105" comment="popt-x86 less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041946" comment="popt less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041947" comment="portmap less than 5beta-749.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041948" comment="postfix less than 2.2.9-10.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042106" comment="powersave-devel less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041949" comment="powersave-libs-32bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042107" comment="powersave-libs-64bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042108" comment="powersave-libs-x86 less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041950" comment="powersave-libs less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041951" comment="powersave less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041952" comment="procinfo less than 18-55.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041953" comment="pwdutils less than 3.0.7.1-17.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041954" comment="readline-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042109" comment="readline-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041955" comment="readline-devel-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042110" comment="readline-devel-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041956" comment="readline-devel less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042111" comment="readline-x86 less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041957" comment="readline less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041958" comment="reiserfs less than 3.6.19-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041959" comment="rpm-devel less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041960" comment="rpm-python less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041961" comment="rpm less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041962" comment="rug less than 7.2.0.0-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041964" comment="scpm less than 1.1.3-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041965" comment="screen less than 4.0.2-62.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041966" comment="scsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041967" comment="sed less than 4.1.4-17.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041969" comment="sudo less than 1.6.8p12-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041970" comment="suseRegister less than 1.2-9.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041971" comment="sysconfig less than 0.50.9-13.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041972" comment="sysfsutils-32bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042112" comment="sysfsutils-64bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042113" comment="sysfsutils-x86 less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041973" comment="sysfsutils less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041974" comment="syslinux less than 3.11-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042114" comment="syslogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041975" comment="sysvinit less than 2.86-21.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041976" comment="terminfo less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041977" comment="udev less than 085-30.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041978" comment="ulimit less than 1.1-146.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041979" comment="update-desktop-files less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041980" comment="util-linux less than 2.12r-35.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041981" comment="wireless-tools less than 28pre13-22.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042115" comment="xfsprogs-devel less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041982" comment="xfsprogs less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042116" comment="xntp-doc less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041983" comment="xntp less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042117" comment="xscsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041984" comment="yast2-backup less than 2.13.5-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041985" comment="yast2-bootloader less than 2.13.97-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042118" comment="yast2-core-devel less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041986" comment="yast2-core less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041987" comment="yast2-country less than 2.13.52-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042119" comment="yast2-devel less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041988" comment="yast2-firewall less than 2.13.15-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041989" comment="yast2-hardware-detection less than 2.13.7-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041990" comment="yast2-inetd less than 2.13.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041991" comment="yast2-installation less than 2.13.192-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041992" comment="yast2-irda less than 2.13.3-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041993" comment="yast2-kerberos-client less than 2.13.11-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041994" comment="yast2-ldap-client less than 2.13.27-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041995" comment="yast2-ldap less than 2.13.5-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041996" comment="yast2-mail-aliases less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041997" comment="yast2-mail less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041998" comment="yast2-ncurses less than 2.13.66-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041999" comment="yast2-network less than 2.13.98-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042000" comment="yast2-nfs-client less than 2.13.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042001" comment="yast2-nis-client less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042002" comment="yast2-ntp-client less than 2.13.17-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042003" comment="yast2-online-update-frontend less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042004" comment="yast2-online-update less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042005" comment="yast2-packager less than 2.13.175-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042006" comment="yast2-pam less than 2.13.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042007" comment="yast2-perl-bindings less than 2.13.11-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042008" comment="yast2-pkg-bindings less than 2.13.117-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042009" comment="yast2-power-management less than 2.13.9-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042010" comment="yast2-powertweak less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042011" comment="yast2-printer less than 2.13.32-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042012" comment="yast2-profile-manager less than 2.13.6-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042013" comment="yast2-repair less than 2.13.10-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042014" comment="yast2-restore less than 2.13.2-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042015" comment="yast2-runlevel less than 2.13.11-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042016" comment="yast2-samba-client less than 2.13.36-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042017" comment="yast2-schema less than 2.13.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042018" comment="yast2-security less than 2.13.7-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042019" comment="yast2-slp less than 2.13.4-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042120" comment="yast2-storage-devel less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042121" comment="yast2-storage-evms less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042020" comment="yast2-storage-lib less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042021" comment="yast2-storage less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042022" comment="yast2-support less than 2.13.6-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042023" comment="yast2-sysconfig less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042024" comment="yast2-theme-NLD less than 0.4.5-3.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042025" comment="yast2-trans-stats less than 2.11.0-21.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042026" comment="yast2-transfer less than 2.13.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042027" comment="yast2-tune less than 2.13.12-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042029" comment="yast2-update less than 2.13.52-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042030" comment="yast2-users less than 2.13.55-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042031" comment="yast2-vm less than 2.13.77-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042032" comment="yast2-xml less than 2.13.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042033" comment="yast2 less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042122" comment="zmd-devel less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042034" comment="zmd-inventory less than 7.2.0-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042035" comment="zmd less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042036" comment="zypper less than 0.6.17-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20065870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-5870</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-5870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5870" source="CVE"/>
	<description>
	Multiple integer overflows in OpenOffice.org (OOo) 2.0.4 and earlier, and possibly other versions before 2.1.0; and StarOffice 6 through 8; allow user-assisted remote attackers to execute arbitrary code via a crafted (a) WMF or (b) EMF file that triggers heap-based buffer overflows in (1) wmf/winwmf.cxx, during processing of META_ESCAPE records; and wmf/enhwmf.cxx, during processing of (2) EMR_POLYPOLYGON and (3) EMR_POLYPOLYGON16 records.
	</description>
 </metadata>
<!-- f83d87195bba0229ac4b65c0cd41c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037827" comment="NetworkManager-devel less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037828" comment="NetworkManager-glib less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037829" comment="NetworkManager-gnome less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037832" comment="NetworkManager less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037928" comment="audit-devel less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037834" comment="audit-libs-32bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037929" comment="audit-libs-64bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037835" comment="audit-libs-python less than 1.2.9-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037930" comment="audit-libs-x86 less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037836" comment="audit-libs less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037837" comment="audit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037842" comment="cifs-mount less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037845" comment="dhcp-client less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037931" comment="dhcp-devel less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037932" comment="dhcp-relay less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037933" comment="dhcp-server less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037846" comment="dhcp less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037934" comment="gdb-32bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037935" comment="gdb-64bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037936" comment="gdb-x86 less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037858" comment="gdb less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037862" comment="glib2-32bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037937" comment="glib2-64bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037863" comment="glib2-devel less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037864" comment="glib2-doc less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037938" comment="glib2-x86 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037865" comment="glib2 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037867" comment="gnome-filesystem less than 0.1-261.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037873" comment="gstreamer010-plugins-base-32bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037939" comment="gstreamer010-plugins-base-64bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037875" comment="gstreamer010-plugins-base-doc less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037940" comment="gstreamer010-plugins-base-x86 less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037880" comment="gstreamer010-plugins-base less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037888" comment="libbeagle-32bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037941" comment="libbeagle-64bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037942" comment="libbeagle-x86 less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037890" comment="libbeagle less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037892" comment="libgail-gnome less than 1.1.3-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037893" comment="libgdiplus less than 1.2.2-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037943" comment="libmsrpc-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037944" comment="libmsrpc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037896" comment="libsmbclient-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037945" comment="libsmbclient-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037897" comment="libsmbclient-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037946" comment="libsmbclient-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037898" comment="libsmbclient less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037899" comment="libtool-32bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037947" comment="libtool-64bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037948" comment="libtool-x86 less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037900" comment="libtool less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037913" comment="samba-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037949" comment="samba-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037914" comment="samba-client-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037950" comment="samba-client-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037951" comment="samba-client-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037915" comment="samba-client less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037916" comment="samba-doc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037917" comment="samba-krb-printing less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037918" comment="samba-pdb less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037952" comment="samba-python less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037919" comment="samba-vscan less than 0.3.6b-42.49"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037920" comment="samba-winbind-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037953" comment="samba-winbind-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037954" comment="samba-winbind-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037921" comment="samba-winbind less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037955" comment="samba-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037922" comment="samba less than 3.0.24-2.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6101</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6101" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderAddGlyphs function in the Render extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of glyph management data structures.
	</description>
 </metadata>
<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6102</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6102" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeGetVisualInfo function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a2735c6bf8dce53b13ee40593bb74c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041199" comment="OpenIPMI-devel less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041167" comment="OpenIPMI less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041200" comment="bootsplash-theme-SuSE-SLES less than 3.1-69.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041201" comment="ddrescue less than 1.13_0.0.6-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041169" comment="glibc-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041202" comment="glibc-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041170" comment="glibc-devel-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041203" comment="glibc-devel-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041171" comment="glibc-devel less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041172" comment="glibc-html less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041173" comment="glibc-i18ndata less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041174" comment="glibc-info less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041175" comment="glibc-locale-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041204" comment="glibc-locale-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041205" comment="glibc-locale-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041176" comment="glibc-locale less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041206" comment="glibc-profile-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041207" comment="glibc-profile-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041208" comment="glibc-profile-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041209" comment="glibc-profile less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041210" comment="glibc-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041177" comment="glibc less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041178" comment="grub less than 0.97-16.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041179" comment="ipmitool less than 1.8.9-2.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041180" comment="ivman less than 0.6.9-16.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041211" comment="ksh-devel less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041181" comment="ksh less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041182" comment="lvm2 less than 2.02.17-7.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041183" comment="nscd less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041212" comment="release-notes-sles less than 10-43.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041213" comment="sles-release less than 10-15.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041184" comment="timezone less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041185" comment="xorg-x11-Xnest less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041186" comment="xorg-x11-Xvfb less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041187" comment="xorg-x11-Xvnc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041214" comment="xorg-x11-doc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041188" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041189" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041190" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041191" comment="xorg-x11-fonts-scalable less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041192" comment="xorg-x11-fonts-syriac less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041193" comment="xorg-x11-libs-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041215" comment="xorg-x11-libs-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041216" comment="xorg-x11-libs-x86 less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041194" comment="xorg-x11-libs less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041195" comment="xorg-x11-man less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041217" comment="xorg-x11-sdk less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041196" comment="xorg-x11-server-glx less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041197" comment="xorg-x11-server less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041198" comment="xorg-x11 less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
	<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6103</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6103" source="CVE"/>
	<description>
	Integer overflow in the ProcDbeSwapBuffers function in the DBE extension for X.Org 6.8.2, 6.9.0, 7.0, and 7.1, and XFree86 X server, allows local users to execute arbitrary code via a crafted X protocol request that triggers memory corruption during processing of unspecified data structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4a2735c6bf8dce53b13ee40593bb74c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041199" comment="OpenIPMI-devel less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041167" comment="OpenIPMI less than 2.0.7-35.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041200" comment="bootsplash-theme-SuSE-SLES less than 3.1-69.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041201" comment="ddrescue less than 1.13_0.0.6-1.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041169" comment="glibc-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041202" comment="glibc-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041170" comment="glibc-devel-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041203" comment="glibc-devel-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041171" comment="glibc-devel less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041172" comment="glibc-html less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041173" comment="glibc-i18ndata less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041174" comment="glibc-info less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041175" comment="glibc-locale-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041204" comment="glibc-locale-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041205" comment="glibc-locale-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041176" comment="glibc-locale less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041206" comment="glibc-profile-32bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041207" comment="glibc-profile-64bit less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041208" comment="glibc-profile-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041209" comment="glibc-profile less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041210" comment="glibc-x86 less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041177" comment="glibc less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041178" comment="grub less than 0.97-16.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041179" comment="ipmitool less than 1.8.9-2.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041180" comment="ivman less than 0.6.9-16.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041211" comment="ksh-devel less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041181" comment="ksh less than 93r-12.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041182" comment="lvm2 less than 2.02.17-7.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041183" comment="nscd less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041212" comment="release-notes-sles less than 10-43.51"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041213" comment="sles-release less than 10-15.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041184" comment="timezone less than 2.4-31.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041185" comment="xorg-x11-Xnest less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041186" comment="xorg-x11-Xvfb less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041187" comment="xorg-x11-Xvnc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041214" comment="xorg-x11-doc less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041188" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041189" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041190" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041191" comment="xorg-x11-fonts-scalable less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041192" comment="xorg-x11-fonts-syriac less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041193" comment="xorg-x11-libs-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041215" comment="xorg-x11-libs-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041216" comment="xorg-x11-libs-x86 less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041194" comment="xorg-x11-libs less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041195" comment="xorg-x11-man less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041217" comment="xorg-x11-sdk less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041196" comment="xorg-x11-server-glx less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041197" comment="xorg-x11-server less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041198" comment="xorg-x11 less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
	<!-- 7eda55a9d7bcfbc970fb40b2a369d418 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009037717" comment="xorg-x11-devel-32bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037719" comment="xorg-x11-devel-64bit less than 6.9.0-50.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037718" comment="xorg-x11-devel less than 6.9.0-50.45"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6143</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6143" source="CVE"/>
	<description>
	The RPC library in Kerberos 5 1.4 through 1.4.4, and 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, calls an uninitialized function pointer in freed memory, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- b7c2f798262596164eb287796a54bdb1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041840" comment="CheckHardware less than 0.1-988.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041841" comment="aaa_base less than 10-12.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041842" comment="acl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041843" comment="at less than 3.1.8-921.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041844" comment="attr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041845" comment="autofs less than 4.1.4-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041846" comment="autoyast2-installation less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041847" comment="autoyast2 less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042037" comment="bash-x86 less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041848" comment="bash less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042038" comment="bind-chrootenv less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042039" comment="bind-devel-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042040" comment="bind-devel less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042041" comment="bind-doc less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041849" comment="bind-libs-32bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042042" comment="bind-libs-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042043" comment="bind-libs-x86 less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041850" comment="bind-libs less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041851" comment="bind-utils less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042044" comment="bind less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041852" comment="binutils-32bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042045" comment="binutils-64bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042046" comment="binutils-x86 less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041853" comment="binutils less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042047" comment="coreutils-x86 less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041854" comment="coreutils less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041855" comment="cpio less than 2.6-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041856" comment="cron less than 4.1-45.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041857" comment="dbus-1-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042048" comment="dbus-1-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041858" comment="dbus-1-devel less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041859" comment="dbus-1-glib-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042049" comment="dbus-1-glib-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042050" comment="dbus-1-glib-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041860" comment="dbus-1-glib less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041861" comment="dbus-1-gtk less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042051" comment="dbus-1-java less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041862" comment="dbus-1-mono less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041863" comment="dbus-1-python less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041864" comment="dbus-1-qt3-32bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042052" comment="dbus-1-qt3-64bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041865" comment="dbus-1-qt3-devel less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042053" comment="dbus-1-qt3-x86 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041866" comment="dbus-1-qt3 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041867" comment="dbus-1-x11 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042054" comment="dbus-1-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041868" comment="dbus-1 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041869" comment="desktop-translations less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041870" comment="diffutils less than 2.8.7-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041871" comment="dmraid less than 0.99_1.0.0rc13-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041872" comment="dosfstools less than 2.11-15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041873" comment="e2fsprogs-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042055" comment="e2fsprogs-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041874" comment="e2fsprogs-devel-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042056" comment="e2fsprogs-devel-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041875" comment="e2fsprogs-devel less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042057" comment="e2fsprogs-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041876" comment="e2fsprogs less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041877" comment="filesystem less than 10-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041878" comment="findutils-locate less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041879" comment="findutils less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041880" comment="grep less than 2.5.1a-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041881" comment="hal-32bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042058" comment="hal-64bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041882" comment="hal-devel less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041883" comment="hal-gnome less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042059" comment="hal-x86 less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041884" comment="hal less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041885" comment="hwinfo-devel less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041886" comment="hwinfo less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041887" comment="insserv less than 1.04.0-20.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041888" comment="iputils less than ss021109-167.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041889" comment="klogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041890" comment="krb5-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042060" comment="krb5-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042061" comment="krb5-apps-clients less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042062" comment="krb5-apps-servers less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041891" comment="krb5-client less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041892" comment="krb5-devel-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042063" comment="krb5-devel-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041893" comment="krb5-devel less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042064" comment="krb5-doc less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042065" comment="krb5-server less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042066" comment="krb5-x86 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041894" comment="krb5 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042067" comment="ldapcpplib-devel less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041895" comment="ldapcpplib less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041896" comment="libacl-32bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042068" comment="libacl-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042069" comment="libacl-devel-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041897" comment="libacl-devel less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042070" comment="libacl-x86 less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041898" comment="libacl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041899" comment="libattr-32bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042071" comment="libattr-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042072" comment="libattr-devel-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041900" comment="libattr-devel less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042073" comment="libattr-x86 less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041901" comment="libattr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041902" comment="libcom_err-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042074" comment="libcom_err-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042075" comment="libcom_err-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041903" comment="libcom_err less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042076" comment="liby2util-devel less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041904" comment="liby2util less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042077" comment="libzypp-devel less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041905" comment="libzypp-zmd-backend less than 7.1.1.0_0.8-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041906" comment="libzypp less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042078" comment="lilo less than 10.1.22-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041907" comment="lilo less than 22.7-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041908" comment="limal-bootloader less than 1.1.50-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041909" comment="limal-perl less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041910" comment="limal less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041911" comment="mailx less than 11.25-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041912" comment="mcelog less than 0.7-2.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041913" comment="mdadm less than 2.6-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041914" comment="microcode_ctl less than 1.15-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041915" comment="mkinitrd less than 1.2-106.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041916" comment="module-init-tools less than 3.2.2-32.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041917" comment="multipath-tools less than 0.4.7-34.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041918" comment="ncurses-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042079" comment="ncurses-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041919" comment="ncurses-devel-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042080" comment="ncurses-devel-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041920" comment="ncurses-devel less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042081" comment="ncurses-x86 less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041921" comment="ncurses less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041922" comment="nfs-utils less than 1.0.7-36.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041923" comment="nfsidmap less than 0.12-16.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042082" comment="openldap2-back-meta less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042083" comment="openldap2-back-meta less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042084" comment="openldap2-back-perl less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042085" comment="openldap2-back-perl less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041924" comment="openldap2-client-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042086" comment="openldap2-client-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042087" comment="openldap2-client-x86 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041925" comment="openldap2-client less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041926" comment="openldap2-devel-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042088" comment="openldap2-devel-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041927" comment="openldap2-devel less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041928" comment="openldap2 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042089" comment="openldap2 less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042090" comment="openssh-askpass-gnome less than 4.2p1-18.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041929" comment="openssh-askpass less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041930" comment="openssh less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041931" comment="pam-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042091" comment="pam-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042092" comment="pam-devel-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042093" comment="pam-devel-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041932" comment="pam-devel less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041933" comment="pam-modules-32bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042094" comment="pam-modules-64bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042095" comment="pam-modules-x86 less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041934" comment="pam-modules less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042096" comment="pam-x86 less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041935" comment="pam less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041936" comment="parted-32bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042097" comment="parted-64bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042098" comment="parted-devel less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042099" comment="parted-x86 less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041937" comment="parted less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042100" comment="pciutils-devel-32bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042101" comment="pciutils-devel-64bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042102" comment="pciutils-devel less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041938" comment="pciutils less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041939" comment="pcsc-lite-devel less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041940" comment="pcsc-lite less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041941" comment="perl-Bootloader less than 0.4.15-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041942" comment="permissions less than 2007.2.15-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041943" comment="popt-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042103" comment="popt-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041944" comment="popt-devel-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042104" comment="popt-devel-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041945" comment="popt-devel less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042105" comment="popt-x86 less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041946" comment="popt less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041947" comment="portmap less than 5beta-749.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041948" comment="postfix less than 2.2.9-10.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042106" comment="powersave-devel less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041949" comment="powersave-libs-32bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042107" comment="powersave-libs-64bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042108" comment="powersave-libs-x86 less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041950" comment="powersave-libs less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041951" comment="powersave less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041952" comment="procinfo less than 18-55.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041953" comment="pwdutils less than 3.0.7.1-17.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041954" comment="readline-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042109" comment="readline-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041955" comment="readline-devel-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042110" comment="readline-devel-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041956" comment="readline-devel less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042111" comment="readline-x86 less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041957" comment="readline less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041958" comment="reiserfs less than 3.6.19-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041959" comment="rpm-devel less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041960" comment="rpm-python less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041961" comment="rpm less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041962" comment="rug less than 7.2.0.0-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041964" comment="scpm less than 1.1.3-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041965" comment="screen less than 4.0.2-62.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041966" comment="scsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041967" comment="sed less than 4.1.4-17.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041969" comment="sudo less than 1.6.8p12-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041970" comment="suseRegister less than 1.2-9.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041971" comment="sysconfig less than 0.50.9-13.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041972" comment="sysfsutils-32bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042112" comment="sysfsutils-64bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042113" comment="sysfsutils-x86 less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041973" comment="sysfsutils less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041974" comment="syslinux less than 3.11-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042114" comment="syslogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041975" comment="sysvinit less than 2.86-21.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041976" comment="terminfo less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041977" comment="udev less than 085-30.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041978" comment="ulimit less than 1.1-146.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041979" comment="update-desktop-files less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041980" comment="util-linux less than 2.12r-35.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041981" comment="wireless-tools less than 28pre13-22.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042115" comment="xfsprogs-devel less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041982" comment="xfsprogs less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042116" comment="xntp-doc less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041983" comment="xntp less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042117" comment="xscsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041984" comment="yast2-backup less than 2.13.5-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041985" comment="yast2-bootloader less than 2.13.97-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042118" comment="yast2-core-devel less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041986" comment="yast2-core less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041987" comment="yast2-country less than 2.13.52-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042119" comment="yast2-devel less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041988" comment="yast2-firewall less than 2.13.15-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041989" comment="yast2-hardware-detection less than 2.13.7-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041990" comment="yast2-inetd less than 2.13.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041991" comment="yast2-installation less than 2.13.192-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041992" comment="yast2-irda less than 2.13.3-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041993" comment="yast2-kerberos-client less than 2.13.11-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041994" comment="yast2-ldap-client less than 2.13.27-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041995" comment="yast2-ldap less than 2.13.5-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041996" comment="yast2-mail-aliases less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041997" comment="yast2-mail less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041998" comment="yast2-ncurses less than 2.13.66-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041999" comment="yast2-network less than 2.13.98-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042000" comment="yast2-nfs-client less than 2.13.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042001" comment="yast2-nis-client less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042002" comment="yast2-ntp-client less than 2.13.17-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042003" comment="yast2-online-update-frontend less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042004" comment="yast2-online-update less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042005" comment="yast2-packager less than 2.13.175-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042006" comment="yast2-pam less than 2.13.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042007" comment="yast2-perl-bindings less than 2.13.11-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042008" comment="yast2-pkg-bindings less than 2.13.117-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042009" comment="yast2-power-management less than 2.13.9-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042010" comment="yast2-powertweak less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042011" comment="yast2-printer less than 2.13.32-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042012" comment="yast2-profile-manager less than 2.13.6-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042013" comment="yast2-repair less than 2.13.10-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042014" comment="yast2-restore less than 2.13.2-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042015" comment="yast2-runlevel less than 2.13.11-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042016" comment="yast2-samba-client less than 2.13.36-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042017" comment="yast2-schema less than 2.13.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042018" comment="yast2-security less than 2.13.7-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042019" comment="yast2-slp less than 2.13.4-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042120" comment="yast2-storage-devel less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042121" comment="yast2-storage-evms less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042020" comment="yast2-storage-lib less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042021" comment="yast2-storage less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042022" comment="yast2-support less than 2.13.6-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042023" comment="yast2-sysconfig less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042024" comment="yast2-theme-NLD less than 0.4.5-3.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042025" comment="yast2-trans-stats less than 2.11.0-21.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042026" comment="yast2-transfer less than 2.13.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042027" comment="yast2-tune less than 2.13.12-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042029" comment="yast2-update less than 2.13.52-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042030" comment="yast2-users less than 2.13.55-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042031" comment="yast2-vm less than 2.13.77-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042032" comment="yast2-xml less than 2.13.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042033" comment="yast2 less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042122" comment="zmd-devel less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042034" comment="zmd-inventory less than 7.2.0-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042035" comment="zmd less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042036" comment="zypper less than 0.6.17-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20066144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-6144</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2006-6144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6144" source="CVE"/>
	<description>
	The "mechglue" abstraction interface of the GSS-API library for Kerberos 5 1.5 through 1.5.1, as used in Kerberos administration daemon (kadmind) and other products that use this library, allows remote attackers to cause a denial of service (crash) via unspecified vectors that cause mechglue to free uninitialized pointers.
	</description>
 </metadata>
<!-- b7c2f798262596164eb287796a54bdb1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041840" comment="CheckHardware less than 0.1-988.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041841" comment="aaa_base less than 10-12.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041842" comment="acl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041843" comment="at less than 3.1.8-921.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041844" comment="attr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041845" comment="autofs less than 4.1.4-23.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041846" comment="autoyast2-installation less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041847" comment="autoyast2 less than 2.13.95-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042037" comment="bash-x86 less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041848" comment="bash less than 3.1-24.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042038" comment="bind-chrootenv less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042039" comment="bind-devel-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042040" comment="bind-devel less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042041" comment="bind-doc less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041849" comment="bind-libs-32bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042042" comment="bind-libs-64bit less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042043" comment="bind-libs-x86 less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041850" comment="bind-libs less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041851" comment="bind-utils less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042044" comment="bind less than 9.3.4-1.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041852" comment="binutils-32bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042045" comment="binutils-64bit less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042046" comment="binutils-x86 less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041853" comment="binutils less than 2.16.91.0.5-23.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042047" comment="coreutils-x86 less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041854" comment="coreutils less than 5.93-22.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041855" comment="cpio less than 2.6-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041856" comment="cron less than 4.1-45.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041857" comment="dbus-1-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042048" comment="dbus-1-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041858" comment="dbus-1-devel less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041859" comment="dbus-1-glib-32bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042049" comment="dbus-1-glib-64bit less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042050" comment="dbus-1-glib-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041860" comment="dbus-1-glib less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041861" comment="dbus-1-gtk less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042051" comment="dbus-1-java less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041862" comment="dbus-1-mono less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041863" comment="dbus-1-python less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041864" comment="dbus-1-qt3-32bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042052" comment="dbus-1-qt3-64bit less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041865" comment="dbus-1-qt3-devel less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042053" comment="dbus-1-qt3-x86 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041866" comment="dbus-1-qt3 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041867" comment="dbus-1-x11 less than 0.60-33.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042054" comment="dbus-1-x86 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041868" comment="dbus-1 less than 0.60-33.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041869" comment="desktop-translations less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041870" comment="diffutils less than 2.8.7-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041871" comment="dmraid less than 0.99_1.0.0rc13-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041872" comment="dosfstools less than 2.11-15.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041873" comment="e2fsprogs-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042055" comment="e2fsprogs-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041874" comment="e2fsprogs-devel-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042056" comment="e2fsprogs-devel-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041875" comment="e2fsprogs-devel less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042057" comment="e2fsprogs-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041876" comment="e2fsprogs less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041877" comment="filesystem less than 10-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041878" comment="findutils-locate less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041879" comment="findutils less than 4.2.27-14.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041880" comment="grep less than 2.5.1a-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041881" comment="hal-32bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042058" comment="hal-64bit less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041882" comment="hal-devel less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041883" comment="hal-gnome less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042059" comment="hal-x86 less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041884" comment="hal less than 0.5.6-33.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041885" comment="hwinfo-devel less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041886" comment="hwinfo less than 12.46-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041887" comment="insserv less than 1.04.0-20.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041888" comment="iputils less than ss021109-167.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041889" comment="klogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041890" comment="krb5-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042060" comment="krb5-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042061" comment="krb5-apps-clients less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042062" comment="krb5-apps-servers less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041891" comment="krb5-client less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041892" comment="krb5-devel-32bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042063" comment="krb5-devel-64bit less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041893" comment="krb5-devel less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042064" comment="krb5-doc less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042065" comment="krb5-server less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042066" comment="krb5-x86 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041894" comment="krb5 less than 1.4.3-19.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042067" comment="ldapcpplib-devel less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041895" comment="ldapcpplib less than 0.0.4-14.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041896" comment="libacl-32bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042068" comment="libacl-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042069" comment="libacl-devel-64bit less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041897" comment="libacl-devel less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042070" comment="libacl-x86 less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041898" comment="libacl less than 2.2.41-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041899" comment="libattr-32bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042071" comment="libattr-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042072" comment="libattr-devel-64bit less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041900" comment="libattr-devel less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042073" comment="libattr-x86 less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041901" comment="libattr less than 2.4.34-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041902" comment="libcom_err-32bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042074" comment="libcom_err-64bit less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042075" comment="libcom_err-x86 less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041903" comment="libcom_err less than 1.38-25.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042076" comment="liby2util-devel less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041904" comment="liby2util less than 2.13.8-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042077" comment="libzypp-devel less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041905" comment="libzypp-zmd-backend less than 7.1.1.0_0.8-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041906" comment="libzypp less than 2.15.10-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042078" comment="lilo less than 10.1.22-1.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041907" comment="lilo less than 22.7-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041908" comment="limal-bootloader less than 1.1.50-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041909" comment="limal-perl less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041910" comment="limal less than 1.1.56-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041911" comment="mailx less than 11.25-14.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041912" comment="mcelog less than 0.7-2.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041913" comment="mdadm less than 2.6-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041914" comment="microcode_ctl less than 1.15-12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041915" comment="mkinitrd less than 1.2-106.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041916" comment="module-init-tools less than 3.2.2-32.27"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041917" comment="multipath-tools less than 0.4.7-34.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041918" comment="ncurses-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042079" comment="ncurses-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041919" comment="ncurses-devel-32bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042080" comment="ncurses-devel-64bit less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041920" comment="ncurses-devel less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042081" comment="ncurses-x86 less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041921" comment="ncurses less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041922" comment="nfs-utils less than 1.0.7-36.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041923" comment="nfsidmap less than 0.12-16.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042082" comment="openldap2-back-meta less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042083" comment="openldap2-back-meta less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042084" comment="openldap2-back-perl less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042085" comment="openldap2-back-perl less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041924" comment="openldap2-client-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042086" comment="openldap2-client-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042087" comment="openldap2-client-x86 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041925" comment="openldap2-client less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041926" comment="openldap2-devel-32bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042088" comment="openldap2-devel-64bit less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041927" comment="openldap2-devel less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041928" comment="openldap2 less than 2.3.32-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042089" comment="openldap2 less than 2.3.32-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042090" comment="openssh-askpass-gnome less than 4.2p1-18.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041929" comment="openssh-askpass less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041930" comment="openssh less than 4.2p1-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041931" comment="pam-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042091" comment="pam-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042092" comment="pam-devel-32bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042093" comment="pam-devel-64bit less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041932" comment="pam-devel less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041933" comment="pam-modules-32bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042094" comment="pam-modules-64bit less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042095" comment="pam-modules-x86 less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041934" comment="pam-modules less than 10-2.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042096" comment="pam-x86 less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041935" comment="pam less than 0.99.6.3-28.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041936" comment="parted-32bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042097" comment="parted-64bit less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042098" comment="parted-devel less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042099" comment="parted-x86 less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041937" comment="parted less than 1.6.25.1-15.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042100" comment="pciutils-devel-32bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042101" comment="pciutils-devel-64bit less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042102" comment="pciutils-devel less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041938" comment="pciutils less than 2.2.4-16.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041939" comment="pcsc-lite-devel less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041940" comment="pcsc-lite less than 1.2.9_beta9-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041941" comment="perl-Bootloader less than 0.4.15-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041942" comment="permissions less than 2007.2.15-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041943" comment="popt-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042103" comment="popt-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041944" comment="popt-devel-32bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042104" comment="popt-devel-64bit less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041945" comment="popt-devel less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042105" comment="popt-x86 less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041946" comment="popt less than 1.7-271.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041947" comment="portmap less than 5beta-749.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041948" comment="postfix less than 2.2.9-10.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042106" comment="powersave-devel less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041949" comment="powersave-libs-32bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042107" comment="powersave-libs-64bit less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042108" comment="powersave-libs-x86 less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041950" comment="powersave-libs less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041951" comment="powersave less than 0.12.26-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041952" comment="procinfo less than 18-55.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041953" comment="pwdutils less than 3.0.7.1-17.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041954" comment="readline-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042109" comment="readline-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041955" comment="readline-devel-32bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042110" comment="readline-devel-64bit less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041956" comment="readline-devel less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042111" comment="readline-x86 less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041957" comment="readline less than 5.1-24.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041958" comment="reiserfs less than 3.6.19-19.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041959" comment="rpm-devel less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041960" comment="rpm-python less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041961" comment="rpm less than 4.4.2-43.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041962" comment="rug less than 7.2.0.0-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041964" comment="scpm less than 1.1.3-18.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041965" comment="screen less than 4.0.2-62.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041966" comment="scsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041967" comment="sed less than 4.1.4-17.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041969" comment="sudo less than 1.6.8p12-18.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041970" comment="suseRegister less than 1.2-9.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041971" comment="sysconfig less than 0.50.9-13.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041972" comment="sysfsutils-32bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042112" comment="sysfsutils-64bit less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042113" comment="sysfsutils-x86 less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041973" comment="sysfsutils less than 1.3.0-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041974" comment="syslinux less than 3.11-20.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042114" comment="syslogd less than 1.4.1-559.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041975" comment="sysvinit less than 2.86-21.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041976" comment="terminfo less than 5.5-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041977" comment="udev less than 085-30.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041978" comment="ulimit less than 1.1-146.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041979" comment="update-desktop-files less than 10.1-40.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041980" comment="util-linux less than 2.12r-35.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041981" comment="wireless-tools less than 28pre13-22.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042115" comment="xfsprogs-devel less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041982" comment="xfsprogs less than 2.8.16-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042116" comment="xntp-doc less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041983" comment="xntp less than 4.2.0a-70.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042117" comment="xscsi less than 1.7_2.36_1.19_0.17_0.97-12.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041984" comment="yast2-backup less than 2.13.5-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041985" comment="yast2-bootloader less than 2.13.97-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042118" comment="yast2-core-devel less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041986" comment="yast2-core less than 2.13.39-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041987" comment="yast2-country less than 2.13.52-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042119" comment="yast2-devel less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041988" comment="yast2-firewall less than 2.13.15-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041989" comment="yast2-hardware-detection less than 2.13.7-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041990" comment="yast2-inetd less than 2.13.8-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041991" comment="yast2-installation less than 2.13.192-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041992" comment="yast2-irda less than 2.13.3-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041993" comment="yast2-kerberos-client less than 2.13.11-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041994" comment="yast2-ldap-client less than 2.13.27-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041995" comment="yast2-ldap less than 2.13.5-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041996" comment="yast2-mail-aliases less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041997" comment="yast2-mail less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041998" comment="yast2-ncurses less than 2.13.66-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041999" comment="yast2-network less than 2.13.98-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042000" comment="yast2-nfs-client less than 2.13.4-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042001" comment="yast2-nis-client less than 2.13.8-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042002" comment="yast2-ntp-client less than 2.13.17-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042003" comment="yast2-online-update-frontend less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042004" comment="yast2-online-update less than 2.13.59-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042005" comment="yast2-packager less than 2.13.175-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042006" comment="yast2-pam less than 2.13.5-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042007" comment="yast2-perl-bindings less than 2.13.11-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042008" comment="yast2-pkg-bindings less than 2.13.117-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042009" comment="yast2-power-management less than 2.13.9-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042010" comment="yast2-powertweak less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042011" comment="yast2-printer less than 2.13.32-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042012" comment="yast2-profile-manager less than 2.13.6-0.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042013" comment="yast2-repair less than 2.13.10-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042014" comment="yast2-restore less than 2.13.2-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042015" comment="yast2-runlevel less than 2.13.11-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042016" comment="yast2-samba-client less than 2.13.36-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042017" comment="yast2-schema less than 2.13.5-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042018" comment="yast2-security less than 2.13.7-0.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042019" comment="yast2-slp less than 2.13.4-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042120" comment="yast2-storage-devel less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042121" comment="yast2-storage-evms less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042020" comment="yast2-storage-lib less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042021" comment="yast2-storage less than 2.13.94-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042022" comment="yast2-support less than 2.13.6-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042023" comment="yast2-sysconfig less than 2.13.8-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042024" comment="yast2-theme-NLD less than 0.4.5-3.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042025" comment="yast2-trans-stats less than 2.11.0-21.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042026" comment="yast2-transfer less than 2.13.4-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042027" comment="yast2-tune less than 2.13.12-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042029" comment="yast2-update less than 2.13.52-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042030" comment="yast2-users less than 2.13.55-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042031" comment="yast2-vm less than 2.13.77-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042032" comment="yast2-xml less than 2.13.4-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042033" comment="yast2 less than 2.13.104-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042122" comment="zmd-devel less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042034" comment="zmd-inventory less than 7.2.0-0.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042035" comment="zmd less than 7.2.0.0-0.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009042036" comment="zypper less than 0.6.17-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7232</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2006-7232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7232" source="CVE"/>
	<description>
	sql_select.cc in MySQL 5.0.x before 5.0.32 and 5.1.x before 5.1.14 allows remote authenticated users to cause a denial of service (crash) via an EXPLAIN SELECT FROM on the INFORMATION_SCHEMA table, as originally demonstrated using ORDER BY.
	</description>
 </metadata>
<!-- 30a5e3996d30fa92e0adac8c1dafa7ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043025" comment="mysql-Max less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043028" comment="mysql-bench less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043016" comment="mysql-client less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043017" comment="mysql-devel less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043018" comment="mysql-shared-32bit less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043026" comment="mysql-shared-64bit less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043027" comment="mysql-shared-x86 less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043019" comment="mysql-shared less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043020" comment="mysql less than 5.0.26-12.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7234</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2006-7234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7234" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Lynx before 2.8.6rel.4 allows local users to execute arbitrary code via malicious (1) .mailcap and (2) mime.types files in the current working directory.
	</description>
 </metadata>
<!-- 5411df1b613a6a69bdfd1a60aa1f2dcb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043038" comment="lynx less than 2.8.5-51.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7246</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2006-7246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7246" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 3ae188b8ee6ea152ca6d4acbf24ee30e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072989" comment="NetworkManager-devel less than 0.6.6-0.21.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072990" comment="NetworkManager-glib less than 0.6.6-0.21.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072991" comment="NetworkManager-gnome less than 0.6.6-0.21.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072992" comment="NetworkManager less than 0.6.6-0.21.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072993" comment="wpa_supplicant less than 0.4.8-14.29.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20067250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-7250</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2006-7250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-7250" source="CVE"/>
	<description>
	The mime_hdr_cmp function in crypto/asn1/asn_mime.c in OpenSSL 0.9.8t and earlier allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
	<!-- f6896f36048d7e8f3d49c12c286ae0d8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073451" comment="openssl-32bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073455" comment="openssl-64bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073452" comment="openssl-devel-32bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073456" comment="openssl-devel-64bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073453" comment="openssl-devel less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073457" comment="openssl-doc less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073458" comment="openssl-x86 less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073454" comment="openssl less than 0.9.8a-18.64.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073457" comment="openssl-doc less than 0.9.8a-18.64.3"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0002</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0002" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in WordPerfect Document importer/exporter (libwpd) before 0.8.9 allow user-assisted remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted WordPerfect file in which values to loop counters are not properly handled in the (1) WP3TablesGroup::_readContents and (2) WP5DefinitionGroup_DefineTablesSubGroup::WP5DefinitionGroup_DefineTablesSubGroup functions.  NOTE: the integer overflow has been split into CVE-2007-1466.
	</description>
 </metadata>
<!-- f83d87195bba0229ac4b65c0cd41c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037827" comment="NetworkManager-devel less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037828" comment="NetworkManager-glib less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037829" comment="NetworkManager-gnome less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037832" comment="NetworkManager less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037928" comment="audit-devel less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037834" comment="audit-libs-32bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037929" comment="audit-libs-64bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037835" comment="audit-libs-python less than 1.2.9-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037930" comment="audit-libs-x86 less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037836" comment="audit-libs less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037837" comment="audit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037842" comment="cifs-mount less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037845" comment="dhcp-client less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037931" comment="dhcp-devel less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037932" comment="dhcp-relay less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037933" comment="dhcp-server less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037846" comment="dhcp less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037934" comment="gdb-32bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037935" comment="gdb-64bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037936" comment="gdb-x86 less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037858" comment="gdb less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037862" comment="glib2-32bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037937" comment="glib2-64bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037863" comment="glib2-devel less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037864" comment="glib2-doc less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037938" comment="glib2-x86 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037865" comment="glib2 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037867" comment="gnome-filesystem less than 0.1-261.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037873" comment="gstreamer010-plugins-base-32bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037939" comment="gstreamer010-plugins-base-64bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037875" comment="gstreamer010-plugins-base-doc less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037940" comment="gstreamer010-plugins-base-x86 less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037880" comment="gstreamer010-plugins-base less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037888" comment="libbeagle-32bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037941" comment="libbeagle-64bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037942" comment="libbeagle-x86 less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037890" comment="libbeagle less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037892" comment="libgail-gnome less than 1.1.3-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037893" comment="libgdiplus less than 1.2.2-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037943" comment="libmsrpc-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037944" comment="libmsrpc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037896" comment="libsmbclient-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037945" comment="libsmbclient-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037897" comment="libsmbclient-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037946" comment="libsmbclient-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037898" comment="libsmbclient less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037899" comment="libtool-32bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037947" comment="libtool-64bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037948" comment="libtool-x86 less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037900" comment="libtool less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037913" comment="samba-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037949" comment="samba-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037914" comment="samba-client-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037950" comment="samba-client-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037951" comment="samba-client-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037915" comment="samba-client less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037916" comment="samba-doc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037917" comment="samba-krb-printing less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037918" comment="samba-pdb less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037952" comment="samba-python less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037919" comment="samba-vscan less than 0.3.6b-42.49"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037920" comment="samba-winbind-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037953" comment="samba-winbind-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037954" comment="samba-winbind-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037921" comment="samba-winbind less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037955" comment="samba-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037922" comment="samba less than 3.0.24-2.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0010</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0010" source="CVE"/>
	<description>
	The GdkPixbufLoader function in GIMP ToolKit (GTK+) in GTK 2 (gtk2) before 2.4.13 allows context-dependent attackers to cause a denial of service (crash) via a malformed image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 910453b56d92f11dc3441c5f3674ea54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009040930" comment="cairo-32bit less than 1.0.2-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041003" comment="cairo-64bit less than 1.0.2-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040931" comment="cairo-devel less than 1.0.2-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040932" comment="cairo-doc less than 1.0.2-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041004" comment="cairo-x86 less than 1.0.2-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040933" comment="cairo less than 1.0.2-27.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040934" comment="control-center2-devel less than 2.12.3-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040935" comment="control-center2 less than 2.12.3-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040936" comment="eel-32bit less than 2.12.2-18.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041005" comment="eel-64bit less than 2.12.2-18.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040937" comment="eel-devel less than 2.12.2-18.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041006" comment="eel-x86 less than 2.12.2-18.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040938" comment="eel less than 2.12.2-18.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040939" comment="evolution-data-server-32bit less than 1.6.0-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041007" comment="evolution-data-server-64bit less than 1.6.0-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040940" comment="evolution-data-server-devel less than 1.6.0-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041008" comment="evolution-data-server-x86 less than 1.6.0-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040941" comment="evolution-data-server less than 1.6.0-43.53"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040945" comment="gnome-applets-devel less than 2.12.2-51.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040946" comment="gnome-applets less than 2.12.2-51.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040947" comment="gnome-cups-manager-devel less than 0.32cvs20060120-33.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040948" comment="gnome-cups-manager less than 0.32cvs20060120-33.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040949" comment="gnome-desktop-32bit less than 2.12.2-25.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041009" comment="gnome-desktop-64bit less than 2.12.2-25.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040950" comment="gnome-desktop-devel less than 2.12.2-25.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041010" comment="gnome-desktop-x86 less than 2.12.2-25.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040951" comment="gnome-desktop less than 2.12.2-25.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040952" comment="gnome-keyring-32bit less than 0.4.6-18.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041011" comment="gnome-keyring-64bit less than 0.4.6-18.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040953" comment="gnome-keyring-devel less than 0.4.6-18.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041012" comment="gnome-keyring-x86 less than 0.4.6-18.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040954" comment="gnome-keyring less than 0.4.6-18.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040956" comment="gnome-main-menu less than 0.9.8-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040957" comment="gnome-menus-32bit less than 2.16.1-38.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041013" comment="gnome-menus-64bit less than 2.16.1-38.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040958" comment="gnome-menus-devel less than 2.16.1-38.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041014" comment="gnome-menus-x86 less than 2.16.1-38.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040959" comment="gnome-menus less than 2.16.1-38.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040960" comment="gnome-panel-nld-32bit less than 2.12.3-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041015" comment="gnome-panel-nld-64bit less than 2.12.3-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040962" comment="gnome-panel-nld-doc less than 2.12.3-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041016" comment="gnome-panel-nld-x86 less than 2.12.3-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040963" comment="gnome-panel-nld less than 2.12.3-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040964" comment="gnome-vfs2-32bit less than 2.12.2-58.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041017" comment="gnome-vfs2-64bit less than 2.12.2-58.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040965" comment="gnome-vfs2-devel less than 2.12.2-58.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040966" comment="gnome-vfs2-doc less than 2.12.2-58.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041018" comment="gnome-vfs2-x86 less than 2.12.2-58.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040967" comment="gnome-vfs2 less than 2.12.2-58.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040968" comment="gstreamer010-32bit less than 0.10.4-11.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041019" comment="gstreamer010-64bit less than 0.10.4-11.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040970" comment="gstreamer010-doc less than 0.10.4-11.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041020" comment="gstreamer010-x86 less than 0.10.4-11.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040971" comment="gstreamer010 less than 0.10.4-11.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040972" comment="gtk2-32bit less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041021" comment="gtk2-64bit less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037768" comment="gtk2-devel-64bit less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037767" comment="gtk2-devel less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040973" comment="gtk2-doc less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041022" comment="gtk2-x86 less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040974" comment="gtk2 less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040976" comment="gtkhtml2 less than 3.10.0-15.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040978" comment="libgnomedb-devel less than 1.3.91-23.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040979" comment="libgnomedb less than 1.3.91-23.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040980" comment="libgnomesu-devel less than 1.0.0-32.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040981" comment="libgnomesu less than 1.0.0-32.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040982" comment="libgnomeui-32bit less than 2.12.1-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041023" comment="libgnomeui-64bit less than 2.12.1-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040983" comment="libgnomeui-devel less than 2.12.1-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040984" comment="libgnomeui-doc less than 2.12.1-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041024" comment="libgnomeui-x86 less than 2.12.1-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040985" comment="libgnomeui less than 2.12.1-0.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040986" comment="libgsf-32bit less than 1.13.99-13.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041025" comment="libgsf-64bit less than 1.13.99-13.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040987" comment="libgsf-devel less than 1.13.99-13.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040988" comment="libgsf-doc less than 1.13.99-13.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040989" comment="libgsf-gnome less than 1.13.99-13.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041026" comment="libgsf-x86 less than 1.13.99-13.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040990" comment="libgsf less than 1.13.99-13.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040991" comment="libsoup-32bit less than 2.2.90-18.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041027" comment="libsoup-64bit less than 2.2.90-18.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040992" comment="libsoup-devel-32bit less than 2.2.90-18.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041028" comment="libsoup-devel-64bit less than 2.2.90-18.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040993" comment="libsoup-devel less than 2.2.90-18.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041029" comment="libsoup-x86 less than 2.2.90-18.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040994" comment="libsoup less than 2.2.90-18.19"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040995" comment="mozilla-nspr-32bit less than 4.6.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041030" comment="mozilla-nspr-64bit less than 4.6.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040996" comment="mozilla-nspr-devel less than 4.6.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041031" comment="mozilla-nspr-x86 less than 4.6.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040997" comment="mozilla-nspr less than 4.6.4-0.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040998" comment="nautilus-32bit less than 2.12.2-64.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041032" comment="nautilus-64bit less than 2.12.2-64.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009040999" comment="nautilus-devel less than 2.12.2-64.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041033" comment="nautilus-x86 less than 2.12.2-64.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041000" comment="nautilus less than 2.12.2-64.33"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041001" comment="vte-devel less than 0.11.17-0.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041002" comment="vte less than 0.11.17-0.11"/>
		</criteria>
	</criteria>
	<!-- c0136d5f769f780ec791f2b7c698b64b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009037768" comment="gtk2-devel-64bit less than 2.8.11-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009037767" comment="gtk2-devel less than 2.8.11-0.15"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0062</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2007-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0062" source="CVE"/>
	<description>
	Integer overflow in the ISC dhcpd 3.0.x before 3.0.7 and 3.1.x before 3.1.1; and the DHCP server in EMC VMware Workstation before 5.5.5 Build 56455 and 6.x before 6.0.1 Build 55017, Player before 1.0.5 Build 56455 and Player 2 before 2.0.1 Build 55017, ACE before 1.0.3 Build 54075 and ACE 2 before 2.0.1 Build 55017, and Server before 1.0.4 Build 56528; allows remote attackers to cause a denial of service (daemon crash) or execute arbitrary code via a malformed DHCP packet with a large dhcp-max-message-size that triggers a stack-based buffer overflow, related to servers configured to send many DHCP options to clients.
	</description>
 </metadata>
<!-- 830e238e315dc7c52906686db9e91ab7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043262" comment="dhcp-devel less than 3.0.3-23.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043263" comment="dhcp-relay less than 3.0.3-23.52"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043264" comment="dhcp-server less than 3.0.3-23.52"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0238</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0238" source="CVE"/>
	<description>
	Stack-based buffer overflow in filter\starcalc\scflt.cxx in the StarCalc parser in OpenOffice.org (OOo) Office Suite before 2.2, and 1.x before 1.1.5 Patch, allows user-assisted remote attackers to execute arbitrary code via a document with a long Note.
	</description>
 </metadata>
<!-- f83d87195bba0229ac4b65c0cd41c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037827" comment="NetworkManager-devel less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037828" comment="NetworkManager-glib less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037829" comment="NetworkManager-gnome less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037832" comment="NetworkManager less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037928" comment="audit-devel less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037834" comment="audit-libs-32bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037929" comment="audit-libs-64bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037835" comment="audit-libs-python less than 1.2.9-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037930" comment="audit-libs-x86 less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037836" comment="audit-libs less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037837" comment="audit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037842" comment="cifs-mount less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037845" comment="dhcp-client less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037931" comment="dhcp-devel less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037932" comment="dhcp-relay less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037933" comment="dhcp-server less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037846" comment="dhcp less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037934" comment="gdb-32bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037935" comment="gdb-64bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037936" comment="gdb-x86 less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037858" comment="gdb less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037862" comment="glib2-32bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037937" comment="glib2-64bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037863" comment="glib2-devel less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037864" comment="glib2-doc less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037938" comment="glib2-x86 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037865" comment="glib2 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037867" comment="gnome-filesystem less than 0.1-261.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037873" comment="gstreamer010-plugins-base-32bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037939" comment="gstreamer010-plugins-base-64bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037875" comment="gstreamer010-plugins-base-doc less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037940" comment="gstreamer010-plugins-base-x86 less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037880" comment="gstreamer010-plugins-base less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037888" comment="libbeagle-32bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037941" comment="libbeagle-64bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037942" comment="libbeagle-x86 less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037890" comment="libbeagle less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037892" comment="libgail-gnome less than 1.1.3-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037893" comment="libgdiplus less than 1.2.2-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037943" comment="libmsrpc-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037944" comment="libmsrpc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037896" comment="libsmbclient-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037945" comment="libsmbclient-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037897" comment="libsmbclient-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037946" comment="libsmbclient-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037898" comment="libsmbclient less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037899" comment="libtool-32bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037947" comment="libtool-64bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037948" comment="libtool-x86 less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037900" comment="libtool less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037913" comment="samba-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037949" comment="samba-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037914" comment="samba-client-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037950" comment="samba-client-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037951" comment="samba-client-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037915" comment="samba-client less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037916" comment="samba-doc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037917" comment="samba-krb-printing less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037918" comment="samba-pdb less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037952" comment="samba-python less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037919" comment="samba-vscan less than 0.3.6b-42.49"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037920" comment="samba-winbind-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037953" comment="samba-winbind-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037954" comment="samba-winbind-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037921" comment="samba-winbind less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037955" comment="samba-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037922" comment="samba less than 3.0.24-2.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0239</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0239" source="CVE"/>
	<description>
	OpenOffice.org (OOo) Office Suite allows user-assisted remote attackers to execute arbitrary commands via shell metacharacters in a prepared link in a crafted document.
	</description>
 </metadata>
<!-- f83d87195bba0229ac4b65c0cd41c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037827" comment="NetworkManager-devel less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037828" comment="NetworkManager-glib less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037829" comment="NetworkManager-gnome less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037832" comment="NetworkManager less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037928" comment="audit-devel less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037834" comment="audit-libs-32bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037929" comment="audit-libs-64bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037835" comment="audit-libs-python less than 1.2.9-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037930" comment="audit-libs-x86 less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037836" comment="audit-libs less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037837" comment="audit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037842" comment="cifs-mount less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037845" comment="dhcp-client less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037931" comment="dhcp-devel less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037932" comment="dhcp-relay less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037933" comment="dhcp-server less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037846" comment="dhcp less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037934" comment="gdb-32bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037935" comment="gdb-64bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037936" comment="gdb-x86 less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037858" comment="gdb less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037862" comment="glib2-32bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037937" comment="glib2-64bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037863" comment="glib2-devel less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037864" comment="glib2-doc less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037938" comment="glib2-x86 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037865" comment="glib2 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037867" comment="gnome-filesystem less than 0.1-261.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037873" comment="gstreamer010-plugins-base-32bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037939" comment="gstreamer010-plugins-base-64bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037875" comment="gstreamer010-plugins-base-doc less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037940" comment="gstreamer010-plugins-base-x86 less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037880" comment="gstreamer010-plugins-base less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037888" comment="libbeagle-32bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037941" comment="libbeagle-64bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037942" comment="libbeagle-x86 less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037890" comment="libbeagle less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037892" comment="libgail-gnome less than 1.1.3-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037893" comment="libgdiplus less than 1.2.2-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037943" comment="libmsrpc-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037944" comment="libmsrpc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037896" comment="libsmbclient-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037945" comment="libsmbclient-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037897" comment="libsmbclient-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037946" comment="libsmbclient-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037898" comment="libsmbclient less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037899" comment="libtool-32bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037947" comment="libtool-64bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037948" comment="libtool-x86 less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037900" comment="libtool less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037913" comment="samba-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037949" comment="samba-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037914" comment="samba-client-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037950" comment="samba-client-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037951" comment="samba-client-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037915" comment="samba-client less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037916" comment="samba-doc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037917" comment="samba-krb-printing less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037918" comment="samba-pdb less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037952" comment="samba-python less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037919" comment="samba-vscan less than 0.3.6b-42.49"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037920" comment="samba-winbind-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037953" comment="samba-winbind-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037954" comment="samba-winbind-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037921" comment="samba-winbind less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037955" comment="samba-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037922" comment="samba less than 3.0.24-2.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0452</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0452" source="CVE"/>
	<description>
	smbd in Samba 3.0.6 through 3.0.23d allows remote authenticated users to cause a denial of service (memory and CPU exhaustion) by renaming a file in a way that prevents a request from being removed from the deferred open queue, which triggers an infinite loop.
	</description>
 </metadata>
<!-- f83d87195bba0229ac4b65c0cd41c27c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009037827" comment="NetworkManager-devel less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037828" comment="NetworkManager-glib less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037829" comment="NetworkManager-gnome less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037832" comment="NetworkManager less than 0.6.4-60.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037928" comment="audit-devel less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037834" comment="audit-libs-32bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037929" comment="audit-libs-64bit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037835" comment="audit-libs-python less than 1.2.9-12.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037930" comment="audit-libs-x86 less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037836" comment="audit-libs less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037837" comment="audit less than 1.2.9-6.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037842" comment="cifs-mount less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037845" comment="dhcp-client less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037931" comment="dhcp-devel less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037932" comment="dhcp-relay less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037933" comment="dhcp-server less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037846" comment="dhcp less than 3.0.3-23.33"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037934" comment="gdb-32bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037935" comment="gdb-64bit less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037936" comment="gdb-x86 less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037858" comment="gdb less than 6.6-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037862" comment="glib2-32bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037937" comment="glib2-64bit less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037863" comment="glib2-devel less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037864" comment="glib2-doc less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037938" comment="glib2-x86 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037865" comment="glib2 less than 2.8.6-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037867" comment="gnome-filesystem less than 0.1-261.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037873" comment="gstreamer010-plugins-base-32bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037939" comment="gstreamer010-plugins-base-64bit less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037875" comment="gstreamer010-plugins-base-doc less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037940" comment="gstreamer010-plugins-base-x86 less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037880" comment="gstreamer010-plugins-base less than 0.10.5-11.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037888" comment="libbeagle-32bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037941" comment="libbeagle-64bit less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037942" comment="libbeagle-x86 less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037890" comment="libbeagle less than 0.2.16.3-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037892" comment="libgail-gnome less than 1.1.3-41.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037893" comment="libgdiplus less than 1.2.2-13.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037943" comment="libmsrpc-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037944" comment="libmsrpc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037896" comment="libsmbclient-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037945" comment="libsmbclient-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037897" comment="libsmbclient-devel less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037946" comment="libsmbclient-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037898" comment="libsmbclient less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037899" comment="libtool-32bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037947" comment="libtool-64bit less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037948" comment="libtool-x86 less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037900" comment="libtool less than 1.5.22-13.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037913" comment="samba-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037949" comment="samba-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037914" comment="samba-client-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037950" comment="samba-client-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037951" comment="samba-client-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037915" comment="samba-client less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037916" comment="samba-doc less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037917" comment="samba-krb-printing less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037918" comment="samba-pdb less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037952" comment="samba-python less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037919" comment="samba-vscan less than 0.3.6b-42.49"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037920" comment="samba-winbind-32bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037953" comment="samba-winbind-64bit less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037954" comment="samba-winbind-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037921" comment="samba-winbind less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037955" comment="samba-x86 less than 3.0.24-2.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009037922" comment="samba less than 3.0.24-2.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0775</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0775" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the layout engine in Mozilla Firefox before 1.5.0.10 and 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allow remote attackers to cause a denial of service (crash) and potentially execute arbitrary code via certain vectors.
	</description>
 </metadata>
<!-- f2ed7bea62889b94eeb1394136e19e23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041543" comment="MozillaFirefox-translations less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041544" comment="MozillaFirefox less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041545" comment="dejavu less than 2.9-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041546" comment="desktop-data-NLD less than 10.1-31.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041547" comment="mozilla-nss-32bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041567" comment="mozilla-nss-64bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041548" comment="mozilla-nss-devel less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041568" comment="mozilla-nss-x86 less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041550" comment="mozilla-nss less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041569" comment="openmotif-demo less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041570" comment="openmotif-devel-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041571" comment="openmotif-devel-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041572" comment="openmotif-devel less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041551" comment="openmotif-libs-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041573" comment="openmotif-libs-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041574" comment="openmotif-libs-x86 less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041552" comment="openmotif-libs less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041575" comment="openmotif less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041553" comment="sax2-gui less than 1.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041554" comment="sax2-ident less than 1.7-125.38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041576" comment="sax2-libsax-devel less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041577" comment="sax2-libsax-java less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041556" comment="sax2-libsax-perl less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041578" comment="sax2-libsax-python less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041557" comment="sax2-libsax less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041558" comment="sax2-tools less than 2.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041559" comment="sax2 less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041560" comment="tightvnc less than 1.2.9-201.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041561" comment="xdg-menu less than 0.2-66.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041562" comment="xorg-x11-driver-video-nvidia less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041563" comment="xorg-x11-driver-video less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041564" comment="yast2-control-center less than 2.13.10-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041565" comment="yast2-qt less than 2.13.82-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041566" comment="yast2-x11 less than 2.13.13-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0776</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0776" source="CVE"/>
	<description>
	Heap-based buffer overflow in the _cairo_pen_init function in Mozilla Firefox 2.x before 2.0.0.2, Thunderbird before 1.5.0.10, and SeaMonkey before 1.0.8 allows remote attackers to execute arbitrary code via a large stroke-width attribute in the clipPath element in an SVG file.
	</description>
 </metadata>
<!-- f2ed7bea62889b94eeb1394136e19e23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041543" comment="MozillaFirefox-translations less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041544" comment="MozillaFirefox less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041545" comment="dejavu less than 2.9-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041546" comment="desktop-data-NLD less than 10.1-31.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041547" comment="mozilla-nss-32bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041567" comment="mozilla-nss-64bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041548" comment="mozilla-nss-devel less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041568" comment="mozilla-nss-x86 less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041550" comment="mozilla-nss less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041569" comment="openmotif-demo less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041570" comment="openmotif-devel-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041571" comment="openmotif-devel-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041572" comment="openmotif-devel less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041551" comment="openmotif-libs-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041573" comment="openmotif-libs-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041574" comment="openmotif-libs-x86 less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041552" comment="openmotif-libs less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041575" comment="openmotif less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041553" comment="sax2-gui less than 1.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041554" comment="sax2-ident less than 1.7-125.38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041576" comment="sax2-libsax-devel less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041577" comment="sax2-libsax-java less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041556" comment="sax2-libsax-perl less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041578" comment="sax2-libsax-python less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041557" comment="sax2-libsax less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041558" comment="sax2-tools less than 2.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041559" comment="sax2 less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041560" comment="tightvnc less than 1.2.9-201.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041561" comment="xdg-menu less than 0.2-66.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041562" comment="xorg-x11-driver-video-nvidia less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041563" comment="xorg-x11-driver-video less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041564" comment="yast2-control-center less than 2.13.10-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041565" comment="yast2-qt less than 2.13.82-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041566" comment="yast2-x11 less than 2.13.13-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0905</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0905" source="CVE"/>
	<description>
	PHP before 5.2.1 allows attackers to bypass safe_mode and open_basedir restrictions via unspecified vectors in the session extension.  NOTE: it is possible that this issue is a duplicate of CVE-2006-6383.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 162652df7a68f660e524842dea5cd9f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
		</criteria>
	</criteria>
	<!-- af9af93be33822106acb8114367d0591 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0906</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0906" source="CVE"/>
	<description>
	Multiple buffer overflows in PHP before 5.2.1 allow attackers to cause a denial of service and possibly execute arbitrary code via unspecified vectors in the (1) session, (2) zip, (3) imap, and (4) sqlite extensions; (5) stream filters; and the (6) str_replace, (7) mail, (8) ibase_delete_user, (9) ibase_add_user, and (10) ibase_modify_user functions.  NOTE: vector 6 might actually be an integer overflow (CVE-2007-1885).  NOTE: as of 20070411, vector (3) might involve the imap_mail_compose function (CVE-2007-1825).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 162652df7a68f660e524842dea5cd9f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
		</criteria>
	</criteria>
	<!-- af9af93be33822106acb8114367d0591 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0907</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0907" source="CVE"/>
	<description>
	Buffer underflow in PHP before 5.2.1 allows attackers to cause a denial of service via unspecified vectors involving the sapi_header_op function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 162652df7a68f660e524842dea5cd9f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
		</criteria>
	</criteria>
	<!-- af9af93be33822106acb8114367d0591 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0908</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0908" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0908" source="CVE"/>
	<description>
	The WDDX deserializer in the wddx extension in PHP 5 before 5.2.1 and PHP 4 before 4.4.5 does not properly initialize the key_length variable for a numerical key, which allows context-dependent attackers to read stack memory via a wddxPacket element that contains a variable with a string name before a numerical variable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 162652df7a68f660e524842dea5cd9f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
		</criteria>
	</criteria>
	<!-- af9af93be33822106acb8114367d0591 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0909</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0909" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in PHP before 5.2.1 might allow attackers to execute arbitrary code via format string specifiers to (1) all of the *print functions on 64-bit systems, and (2) the odbc_result_all function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 162652df7a68f660e524842dea5cd9f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
		</criteria>
	</criteria>
	<!-- af9af93be33822106acb8114367d0591 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0910</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0910" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 5.2.1 allows attackers to "clobber" certain super-global variables via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 162652df7a68f660e524842dea5cd9f2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009041275" comment="apache2-devel less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041276" comment="apache2-doc less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041277" comment="apache2-example-pages less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041278" comment="apache2-mod_php5 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041279" comment="apache2-prefork less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041280" comment="apache2-worker less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041281" comment="apache2 less than 2.2.3-16.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041282" comment="php5-bcmath less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041283" comment="php5-bz2 less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041284" comment="php5-calendar less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041285" comment="php5-ctype less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041286" comment="php5-curl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041287" comment="php5-dba less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041288" comment="php5-dbase less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041289" comment="php5-devel less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041290" comment="php5-dom less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041291" comment="php5-exif less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041292" comment="php5-fastcgi less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041293" comment="php5-filepro less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041294" comment="php5-ftp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041295" comment="php5-gd less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041296" comment="php5-gettext less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041297" comment="php5-gmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041298" comment="php5-iconv less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041299" comment="php5-imap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041300" comment="php5-ldap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041301" comment="php5-mbstring less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041302" comment="php5-mcrypt less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041303" comment="php5-mhash less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041304" comment="php5-mysql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041305" comment="php5-mysqli less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041306" comment="php5-ncurses less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041307" comment="php5-odbc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041308" comment="php5-openssl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041309" comment="php5-pcntl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041310" comment="php5-pdo less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041311" comment="php5-pear less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041312" comment="php5-pgsql less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041313" comment="php5-posix less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041314" comment="php5-pspell less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041315" comment="php5-shmop less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041316" comment="php5-snmp less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041317" comment="php5-soap less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041318" comment="php5-sockets less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041319" comment="php5-sqlite less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041320" comment="php5-sysvmsg less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041321" comment="php5-sysvsem less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041322" comment="php5-sysvshm less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041323" comment="php5-tokenizer less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041324" comment="php5-wddx less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041325" comment="php5-xmlreader less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041326" comment="php5-xmlrpc less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041327" comment="php5-xsl less than 5.1.2-29.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009041328" comment="php5-zlib less than 5.1.2-29.35"/>
		</criteria>
	</criteria>
	<!-- af9af93be33822106acb8114367d0591 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009038583" comment="php5-suhosin less than 5.1.2-29.35"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20070981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-0981</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP1 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP1 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-0981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0981" source="CVE"/>
	<description>
	Mozilla based browsers, including Firefox before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8, allow remote attackers to bypass the same origin policy, steal cookies, and conduct other attacks by writing a URI with a null byte to the hostname (location.hostname) DOM property, due to interactions with DNS resolver code.
	</description>
 </metadata>
<!-- f2ed7bea62889b94eeb1394136e19e23 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp1-online is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009041543" comment="MozillaFirefox-translations less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041544" comment="MozillaFirefox less than 2.0.0.2-2.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041545" comment="dejavu less than 2.9-0.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041546" comment="desktop-data-NLD less than 10.1-31.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041547" comment="mozilla-nss-32bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041567" comment="mozilla-nss-64bit less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041548" comment="mozilla-nss-devel less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041568" comment="mozilla-nss-x86 less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041550" comment="mozilla-nss less than 3.11.4-0.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041569" comment="openmotif-demo less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041570" comment="openmotif-devel-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041571" comment="openmotif-devel-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041572" comment="openmotif-devel less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041551" comment="openmotif-libs-32bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041573" comment="openmotif-libs-64bit less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041574" comment="openmotif-libs-x86 less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041552" comment="openmotif-libs less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041575" comment="openmotif less than 2.2.4-21.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041553" comment="sax2-gui less than 1.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041554" comment="sax2-ident less than 1.7-125.38"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041576" comment="sax2-libsax-devel less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041577" comment="sax2-libsax-java less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041556" comment="sax2-libsax-perl less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041578" comment="sax2-libsax-python less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041557" comment="sax2-libsax less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041558" comment="sax2-tools less than 2.7-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041559" comment="sax2 less than 7.1-125.37"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041560" comment="tightvnc less than 1.2.9-201.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041561" comment="xdg-menu less than 0.2-66.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041562" comment="xorg-x11-driver-video-nvidia less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041563" comment="xorg-x11-driver-video less than 6.9.0-46.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041564" comment="yast2-control-center less than 2.13.10-0.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041565" comment="yast2-qt less than 2.13.82-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009041566" comment="yast2-x11 less than 2.13.13-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20071358" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-1358</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2007-1358" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1358" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in certain applications using Apache Tomcat 4.0.0 through 4.0.6 and 4.1.0 through 4.1.34 allows remote attackers to inject arbitrary web script or HTML via crafted "Accept-Language headers that do not conform to RFC 2616".
	</description>
 </metadata>
<!-- 92960116ff6e91e1d8bc4b0cc8af4ea7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009039327" comment="tomcat5-admin-webapps less than 5.0.30-27.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039328" comment="tomcat5-webapps less than 5.0.30-27.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009039329" comment="tomcat5 less than 5.0.30-27.35"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20072519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-2519</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-2519" source="CVE"/>
	<description>
	Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0.  NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions.
	</description>
 </metadata>
<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20074573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-4573</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2007-4573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4573" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register.
	</description>
 </metadata>
<!-- 17711b37b9377f599635ebd22c5f3779 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063222" comment="ib-bonding-kmp-default less than 0.9.0_2.6.16.60_0.69.5-1.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063223" comment="oracleasm-kmp-default less than 2.0.5_2.6.16.60_0.69.5-7.5.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20075240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-5240</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2007-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-5240" source="CVE"/>
	<description>
	Visual truncation vulnerability in the Java Runtime Environment in Sun JDK and JRE 6 Update 2 and earlier, JDK and JRE 5.0 Update 12 and earlier, SDK and JRE 1.4.2_15 and earlier, and SDK and JRE 1.3.1_20 and earlier allows remote attackers to circumvent display of the untrusted-code warning banner by creating a window larger than the workstation screen.
	</description>
 </metadata>
<!-- c75f99d8e875876c1432cb28ca2d13b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047000" comment="java-1_4_2-ibm-devel less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047001" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047002" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047003" comment="java-1_4_2-ibm less than 1.4.2_sr11-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6167</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Point Of Sale 10 for x86</platform>
	</affected>
	<reference ref_id="CVE-2007-6167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6167" source="CVE"/>
	<description>
	Untrusted search path vulnerability in yast2-core in SUSE Linux might allow local users to execute arbitrary code by creating a malicious yast2 module in the current working directory.
	</description>
 </metadata>
<!-- b2b5779b3105842f8b7ea5b6992883ad -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047431" comment="sles10-slepos is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047432" comment="yast2-core-devel less than 2.13.41-0.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047430" comment="yast2-core less than 2.13.41-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2007-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6420" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the balancer-manager in mod_proxy_balancer for Apache HTTP Server 2.2.x allows remote attackers to gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- 8c2a00b08b0a861926f7e3f8eb433ce9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047494" comment="apache2-devel less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047495" comment="apache2-doc less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047496" comment="apache2-example-pages less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047497" comment="apache2-prefork less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047498" comment="apache2-worker less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047499" comment="apache2 less than 2.2.3-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6716</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2007-6716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6716" source="CVE"/>
	<description>
	fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 112e2d60fade685e1d5878ae21ce2bc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
	</criteria>
	<!-- 1f60f6114b5878d38c45087bbe9d5f99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047573" comment="kernel-xenpae less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 51097d5d388421c6b5752d422c0c672a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 8f81a57487eb7e634b38c9359fc25d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047591" comment="kernel-rt less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047592" comment="kernel-rt_bigsmp less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047593" comment="kernel-rt_debug less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047594" comment="kernel-rt_timing less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047595" comment="kernel-source less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047596" comment="kernel-syms less than 2.6.22.19-0.18"/>
		</criteria>
	</criteria>
	<!-- f8a0975219658ddcd214ea7538810b92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6725</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2007-6725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6725" source="CVE"/>
	<description>
	The CCITTFax decoding filter in Ghostscript 8.60, 8.61, and possibly other versions, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PDF file that triggers a buffer underflow in the cf_decode_2d function.
	</description>
 </metadata>
<!-- c7c8eefdde3a0078cda443e72602886a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047618" comment="ghostscript-fonts-rus less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047619" comment="ghostscript-omni less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047620" comment="libgimpprint-devel less than 4.2.7-62.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20076750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2007-6750</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2007-6750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6750" source="CVE"/>
	<description>
	The Apache HTTP Server 1.x and 2.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris, related to the lack of the mod_reqtimeout module in versions before 2.2.15.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e0c99b5795cd7497ef910246faba28d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073121" comment="apache2-devel less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073122" comment="apache2-doc less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073123" comment="apache2-example-pages less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073124" comment="apache2-prefork less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073125" comment="apache2-worker less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073126" comment="apache2 less than 2.2.3-16.44.1"/>
		</criteria>
	</criteria>
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0016</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-0016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0016" source="CVE"/>
	<description>
	Stack-based buffer overflow in the URL parsing implementation in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to execute arbitrary code via a crafted UTF-8 URL in a link.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0017</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-0017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0017" source="CVE"/>
	<description>
	The http-index-format MIME type parser (nsDirIndexParser) in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 does not check for an allocation failure, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an HTTP index response with a crafted 200 header, which triggers memory corruption and a buffer overflow.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0564</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-0564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0564" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mailman before 2.1.10b1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to (1) editing templates and (2) the list's "info attribute" in the web administrator interface, a different vulnerability than CVE-2006-3636.
	</description>
 </metadata>
<!-- 26600278f6138b5e42cfe92fd0ee2777 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047941" comment="mailman less than 2.1.7-15.5.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0598</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-0598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0598" source="CVE"/>
	<description>
	Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1c957a85a69c88dcb46bbd0a62699cc4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
		</criteria>
	</criteria>
	<!-- 3276f37f75cc08a5c448154a6a6c031c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 58606a54b98cffc92a05e22b837abf49 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060835" comment="kernel-iseries64 less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060837" comment="kernel-ppc64 less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
		</criteria></criteria>
	<!-- 5e8c429ac407ead6820878090901b73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 5f023b1674833357edde4fe75478d5b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048010" comment="kernel-xen less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048011" comment="kernel-xenpae less than 2.6.16.60-0.29"/>
		</criteria>
	</criteria>
	<!-- 718b6702959f49befc427f8e908e1ce1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048029" comment="kernel-debug less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048030" comment="kernel-kdump less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048028" comment="kernel-xen less than 2.6.16.60-0.30"/>
		</criteria>
	</criteria>
	<!-- 75b1fc9033bce92e8f6775150c0af485 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
		</criteria></criteria>
	<!-- b1a5693e9b87368b2dc89b804303d9b2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060841" comment="kernel-smp less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria></criteria>
	<!-- cf13ba7162e8d3407e2e9d889c8521f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060843" comment="kernel-bigsmp less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060845" comment="kernel-kdumppae less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060841" comment="kernel-smp less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060846" comment="kernel-vmi less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060847" comment="kernel-vmipae less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060844" comment="kernel-xenpae less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060844" comment="kernel-xenpae less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0599</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-0599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0599" source="CVE"/>
	<description>
	The init_request_info function in sapi/cgi/cgi_main.c in PHP before 5.2.6 does not properly consider operator precedence when calculating the length of PATH_TRANSLATED, which might allow remote attackers to execute arbitrary code via a crafted URI.
	</description>
 </metadata>
<!-- f40fbf7e9f8c3e69a8cb026afa49aadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048089" comment="apache2-mod_php5 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048090" comment="php5-bcmath less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048091" comment="php5-bz2 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048092" comment="php5-calendar less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048093" comment="php5-ctype less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048094" comment="php5-curl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048095" comment="php5-dba less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048096" comment="php5-dbase less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048097" comment="php5-devel less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048098" comment="php5-dom less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048099" comment="php5-exif less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048100" comment="php5-fastcgi less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048101" comment="php5-ftp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048102" comment="php5-gd less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048103" comment="php5-gettext less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048104" comment="php5-gmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048105" comment="php5-iconv less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048106" comment="php5-imap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048108" comment="php5-ldap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048109" comment="php5-mbstring less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048110" comment="php5-mcrypt less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048111" comment="php5-mhash less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048112" comment="php5-mysql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048113" comment="php5-ncurses less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048114" comment="php5-odbc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048115" comment="php5-openssl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048116" comment="php5-pcntl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048117" comment="php5-pdo less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048118" comment="php5-pear less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048119" comment="php5-pgsql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048120" comment="php5-posix less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048121" comment="php5-pspell less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048122" comment="php5-shmop less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048123" comment="php5-snmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048124" comment="php5-soap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048125" comment="php5-sockets less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048126" comment="php5-sqlite less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048127" comment="php5-suhosin less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048128" comment="php5-sysvmsg less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048129" comment="php5-sysvsem less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048130" comment="php5-sysvshm less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048137" comment="php5-tidy less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048131" comment="php5-tokenizer less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048132" comment="php5-wddx less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048133" comment="php5-xmlreader less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048134" comment="php5-xmlrpc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048135" comment="php5-xsl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048136" comment="php5-zlib less than 5.2.5-9.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0928</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-0928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0928" source="CVE"/>
	<description>
	Qemu 0.9.1 and earlier does not perform range checks for block device read or write requests, which allows guest host users with root privileges to access arbitrary memory and escape the virtual machine.
	</description>
 </metadata>
<!-- 816577e14f3b7b0abdb6d607f482c9a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048155" comment="qemu less than 0.8.2-37.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20080960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-0960</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-0960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-0960" source="CVE"/>
	<description>
	SNMPv3 HMAC verification in (1) Net-SNMP 5.2.x before 5.2.4.1, 5.3.x before 5.3.2.1, and 5.4.x before 5.4.1.1; (2) UCD-SNMP; (3) eCos; (4) Juniper Session and Resource Control (SRC) C-series 1.0.0 through 2.0.0; (5) NetApp (aka Network Appliance) Data ONTAP 7.3RC1 and 7.3RC2; (6) SNMP Research before 16.2; (7) multiple Cisco IOS, CatOS, ACE, and Nexus products; (8) Ingate Firewall 3.1.0 and later and SIParator 3.1.0 and later; (9) HP OpenView SNMP Emanate Master Agent 15.x; and possibly other products relies on the client to specify the HMAC length, which makes it easier for remote attackers to bypass SNMP authentication via a length value of 1, which only checks the first byte.
	</description>
 </metadata>
<!-- 71093bdfd49361f6dbe32a8fde43b848 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048182" comment="net-snmp-devel-64bit less than 5.3.0.1-25.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048175" comment="net-snmp-devel less than 5.3.0.1-25.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1096</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1096" source="CVE"/>
	<description>
	The load_tile function in the XCF coder in coders/xcf.c in (1) ImageMagick 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .xcf file that triggers an out-of-bounds heap write, possibly related to the ScaleCharToQuantum function.
	</description>
 </metadata>
<!-- 00876b5798bc42f6bccea7126f32defa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048259" comment="ImageMagick-Magick++-devel less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048255" comment="ImageMagick-Magick++ less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048256" comment="ImageMagick-devel less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048257" comment="ImageMagick less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048258" comment="perl-PerlMagick less than 6.2.5-16.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1097</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1097" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ReadPCXImage function in the PCX coder in coders/pcx.c in (1) ImageMagick 6.2.4-5 and 6.2.8-0 and (2) GraphicsMagick (aka gm) 1.1.7 allows user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted .pcx file that triggers incorrect memory allocation for the scanline array, leading to memory corruption.
	</description>
 </metadata>
<!-- 00876b5798bc42f6bccea7126f32defa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048259" comment="ImageMagick-Magick++-devel less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048255" comment="ImageMagick-Magick++ less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048256" comment="ImageMagick-devel less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048257" comment="ImageMagick less than 6.2.5-16.29"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048258" comment="perl-PerlMagick less than 6.2.5-16.29"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1105</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1105" source="CVE"/>
	<description>
	Heap-based buffer overflow in the receive_smb_raw function in util/sock.c in Samba 3.0.0 through 3.0.29 allows remote attackers to execute arbitrary code via a crafted SMB response.
	</description>
 </metadata>
<!-- b465bc7cbc2819f28527f0fc40c5e3c7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048331" comment="libmsrpc-devel less than 3.0.28-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048332" comment="libmsrpc less than 3.0.28-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048315" comment="libsmbclient-devel less than 3.0.28-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048342" comment="libsmbsharemodes-devel less than 3.0.28-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048343" comment="libsmbsharemodes less than 3.0.28-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048338" comment="samba-python less than 3.0.28-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1108</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1108" source="CVE"/>
	<description>
	Buffer overflow in Evolution 2.22.1, when the ITip Formatter plugin is disabled, allows remote attackers to execute arbitrary code via a long timezone string in an iCalendar attachment.
	</description>
 </metadata>
<!-- 731a8f5a7c90b93aea547074ea30a884 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048350" comment="evolution-devel less than 2.6.0-49.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048351" comment="evolution-pilot less than 2.6.0-49.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048352" comment="evolution less than 2.6.0-49.79"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1109</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1109" source="CVE"/>
	<description>
	Heap-based buffer overflow in Evolution 2.22.1 allows user-assisted remote attackers to execute arbitrary code via a long DESCRIPTION property in an iCalendar attachment, which is not properly handled during a reply in the calendar view (aka the Calendars window).
	</description>
 </metadata>
<!-- 731a8f5a7c90b93aea547074ea30a884 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048350" comment="evolution-devel less than 2.6.0-49.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048351" comment="evolution-pilot less than 2.6.0-49.79"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048352" comment="evolution less than 2.6.0-49.79"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1145</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1145" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1187</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1187" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) and JDK 6 Update 4 and earlier, 5.0 Update 14 and earlier, and SDK/JRE 1.4.2_16 and earlier allows remote attackers to cause a denial of service (JRE crash) and possibly execute arbitrary code via unknown vectors related to XSLT transforms.
	</description>
 </metadata>
<!-- c75f99d8e875876c1432cb28ca2d13b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047000" comment="java-1_4_2-ibm-devel less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047001" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047002" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047003" comment="java-1_4_2-ibm less than 1.4.2_sr11-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1196" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Web Start (javaws.exe) in Sun JDK and JRE 6 Update 4 and earlier and 5.0 Update 14 and earlier; and SDK and JRE 1.4.2_16 and earlier; allows remote attackers to execute arbitrary code via a crafted JNLP file.
	</description>
 </metadata>
<!-- c75f99d8e875876c1432cb28ca2d13b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047000" comment="java-1_4_2-ibm-devel less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047001" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047002" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047003" comment="java-1_4_2-ibm less than 1.4.2_sr11-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1232</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1232" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16 allows remote attackers to inject arbitrary web script or HTML via a crafted string that is used in the message argument to the HttpServletResponse.sendError method.
	</description>
 </metadata>
<!-- f32e6b4db946948fde53216de5e8e53c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048424" comment="tomcat5-admin-webapps less than 5.0.30-27.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048425" comment="tomcat5-webapps less than 5.0.30-27.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048426" comment="tomcat5 less than 5.0.30-27.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1290</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1290" source="CVE"/>
	<description>
	ViewVC before 1.0.5 includes "all-forbidden" files within search results that list CVS or Subversion (SVN) commits, which allows remote attackers to obtain sensitive information.
	</description>
 </metadata>
<!-- 31acd0ac9cc633008672bcf899ead01f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048435" comment="cvs2svn less than 1.3.0-30.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048433" comment="subversion-devel less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048436" comment="subversion-python less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048437" comment="subversion-server less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048438" comment="subversion-tools less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048434" comment="subversion less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048439" comment="viewcvs less than 1.0.5-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1291</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1291" source="CVE"/>
	<description>
	ViewVC before 1.0.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read files and list folders under the hidden CVSROOT folder.
	</description>
 </metadata>
<!-- 31acd0ac9cc633008672bcf899ead01f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048435" comment="cvs2svn less than 1.3.0-30.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048433" comment="subversion-devel less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048436" comment="subversion-python less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048437" comment="subversion-server less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048438" comment="subversion-tools less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048434" comment="subversion less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048439" comment="viewcvs less than 1.0.5-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1292</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1292" source="CVE"/>
	<description>
	ViewVC before 1.0.5 provides revision metadata without properly checking whether access was intended, which allows remote attackers to obtain sensitive information by reading (1) forbidden pathnames in the revision view, (2) log history that can only be reached by traversing a forbidden object, or (3) forbidden diff view path parameters.
	</description>
 </metadata>
<!-- 31acd0ac9cc633008672bcf899ead01f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048435" comment="cvs2svn less than 1.3.0-30.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048433" comment="subversion-devel less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048436" comment="subversion-python less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048437" comment="subversion-server less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048438" comment="subversion-tools less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048434" comment="subversion less than 1.3.1-1.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048439" comment="viewcvs less than 1.0.5-0.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1294</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1294" source="CVE"/>
	<description>
	Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f9272102cdb11fea73949ffdb5ba881 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
	<!-- 8c191558bacc4e54ae26ddcf21d10f9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- d70827089b862762d58e4a5f83a612df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- fa9be097c78c2f4acb003b27ea5b6cce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048452" comment="kernel-xenpae less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1377</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1377" source="CVE"/>
	<description>
	The (1) SProcRecordCreateContext and (2) SProcRecordRegisterClients functions in the Record extension and the (3) SProcSecurityGenerateAuthorization function in the Security extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via requests with crafted length values that specify an arbitrary number of bytes to be swapped on the heap, which triggers heap corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 365f4578a5d4944409898142a04ad8db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
	<!-- 5e89cd8e51d8102f337a87a07775572b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048482" comment="xgl less than cvs_060522-0.44"/>
	</criteria>
	<!-- dafe815cdb6284ae29e4d625d49fd383 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1379</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1379" source="CVE"/>
	<description>
	Integer overflow in the fbShmPutImage function in the MIT-SHM extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to read arbitrary process memory via crafted values for a Pixmap width and height.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 365f4578a5d4944409898142a04ad8db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
	<!-- 5e89cd8e51d8102f337a87a07775572b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048482" comment="xgl less than cvs_060522-0.44"/>
	</criteria>
	<!-- dafe815cdb6284ae29e4d625d49fd383 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1384</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1384" source="CVE"/>
	<description>
	Integer overflow in PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service and possibly have unspecified other impact via a printf format parameter with a large width specifier, related to the php_sprintf_appendstring function in formatted_print.c and probably other functions for formatted strings (aka *printf functions).
	</description>
 </metadata>
<!-- f40fbf7e9f8c3e69a8cb026afa49aadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048089" comment="apache2-mod_php5 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048090" comment="php5-bcmath less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048091" comment="php5-bz2 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048092" comment="php5-calendar less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048093" comment="php5-ctype less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048094" comment="php5-curl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048095" comment="php5-dba less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048096" comment="php5-dbase less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048097" comment="php5-devel less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048098" comment="php5-dom less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048099" comment="php5-exif less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048100" comment="php5-fastcgi less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048101" comment="php5-ftp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048102" comment="php5-gd less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048103" comment="php5-gettext less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048104" comment="php5-gmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048105" comment="php5-iconv less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048106" comment="php5-imap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048108" comment="php5-ldap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048109" comment="php5-mbstring less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048110" comment="php5-mcrypt less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048111" comment="php5-mhash less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048112" comment="php5-mysql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048113" comment="php5-ncurses less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048114" comment="php5-odbc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048115" comment="php5-openssl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048116" comment="php5-pcntl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048117" comment="php5-pdo less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048118" comment="php5-pear less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048119" comment="php5-pgsql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048120" comment="php5-posix less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048121" comment="php5-pspell less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048122" comment="php5-shmop less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048123" comment="php5-snmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048124" comment="php5-soap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048125" comment="php5-sockets less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048126" comment="php5-sqlite less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048127" comment="php5-suhosin less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048128" comment="php5-sysvmsg less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048129" comment="php5-sysvsem less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048130" comment="php5-sysvshm less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048137" comment="php5-tidy less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048131" comment="php5-tokenizer less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048132" comment="php5-wddx less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048133" comment="php5-xmlreader less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048134" comment="php5-xmlrpc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048135" comment="php5-xsl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048136" comment="php5-zlib less than 5.2.5-9.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1389</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1389" source="CVE"/>
	<description>
	libclamav/chmunpack.c in the chm-parser in ClamAV before 0.94 allows remote attackers to cause a denial of service (application crash) via a malformed CHM file, related to an "invalid memory access."
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1391</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-1391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1391" source="CVE"/>
	<description>
	Multiple integer overflows in libc in NetBSD 4.x, FreeBSD 6.x and 7.x, and probably other BSD and Apple Mac OS platforms allow context-dependent attackers to execute arbitrary code via large values of certain integer fields in the format argument to (1) the strfmon function in lib/libc/stdlib/strfmon.c, related to the GET_NUMBER macro; and (2) the printf function, related to left_prec and right_prec.
	</description>
 </metadata>
<!-- a7e1bffd1e2cae6bb5c9bbff3d3f9de2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070518" comment="glibc-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070519" comment="glibc-devel-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070520" comment="glibc-locale-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070521" comment="glibc-locale-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070526" comment="glibc-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070527" comment="glibc-dceext-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070528" comment="glibc-dceext-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070529" comment="glibc-dceext-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070530" comment="glibc-dceext less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1447</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1447" source="CVE"/>
	<description>
	The DNS protocol, as implemented in (1) BIND 8 and 9 before 9.5.0-P1, 9.4.2-P1, and 9.3.5-P1; (2) Microsoft DNS in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP1 and SP2; and other implementations allow remote attackers to spoof DNS traffic via a birthday attack that uses in-bailiwick referrals to conduct cache poisoning against recursive resolvers, related to insufficient randomness of DNS transaction IDs and source ports, aka "DNS Insufficient Socket Entropy Vulnerability" or "the Kaminsky bug."
	</description>
 </metadata>
<!-- 555065b7278085ce1ce7a6e84b6f07aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048606" comment="bind-chrootenv less than 9.3.4-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048607" comment="bind-devel-64bit less than 9.3.4-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048608" comment="bind-devel less than 9.3.4-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048609" comment="bind-doc less than 9.3.4-1.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048612" comment="bind less than 9.3.4-1.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1468</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1468" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in namazu.cgi in Namazu before 2.0.18 allows remote attackers to inject arbitrary web script or HTML via UTF-7 encoded input, related to failure to set the charset, a different vector than CVE-2004-1318 and CVE-2001-1350. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 012a783c433d4c78f22e0e8feac47fce -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009035194" comment="namazu-cgi less than 2.0.18-24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035195" comment="namazu-devel less than 2.0.18-24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009035196" comment="namazu less than 2.0.18-24.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1514</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1514" source="CVE"/>
	<description>
	arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions before 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in 31-bit mode, which triggers an invalid dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 112e2d60fade685e1d5878ae21ce2bc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
	</criteria>
	<!-- 1f60f6114b5878d38c45087bbe9d5f99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047573" comment="kernel-xenpae less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 51097d5d388421c6b5752d422c0c672a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- f8a0975219658ddcd214ea7538810b92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1615</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1615" source="CVE"/>
	<description>
	Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03ce55a17ff56088bbdc53d2ba061f4d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048728" comment="kernel-rt less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048729" comment="kernel-rt_debug less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048730" comment="kernel-rt_timing less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048731" comment="kernel-source less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048732" comment="kernel-syms less than 2.6.22.19-0.15"/>
		</criteria>
	</criteria>
	<!-- 16c9561173f6bcfccc30161da1dcd208 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048739" comment="kernel-xenpae less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- 233a5910a88f0bf42279ffd84e4a5140 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 6294454605fd9887f3377735a3c1b830 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 80584d28331d8bb57344e54489b5e1e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048728" comment="kernel-rt less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048751" comment="kernel-rt_bigsmp less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048729" comment="kernel-rt_debug less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048730" comment="kernel-rt_timing less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048731" comment="kernel-source less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048732" comment="kernel-syms less than 2.6.22.19-0.15"/>
		</criteria>
	</criteria>
	<!-- 9b665aac984a0b06dae395f7e6fc9e7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- bc1f88632515826f7b9f2f43cddfbe8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
	</criteria>
	<!-- dd4ff74b273d12c2372f78981ed28f80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048755" comment="kernel-xenpae less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- e71e059b0b1b921d1a3b888f17f527a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- ee7e254f1ae1a2b7b1e639bc87c01179 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1669</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1669" source="CVE"/>
	<description>
	Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c9561173f6bcfccc30161da1dcd208 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048739" comment="kernel-xenpae less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- 233a5910a88f0bf42279ffd84e4a5140 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 6294454605fd9887f3377735a3c1b830 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 9b665aac984a0b06dae395f7e6fc9e7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- bc1f88632515826f7b9f2f43cddfbe8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
	</criteria>
	<!-- dd4ff74b273d12c2372f78981ed28f80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048755" comment="kernel-xenpae less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- e71e059b0b1b921d1a3b888f17f527a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- ee7e254f1ae1a2b7b1e639bc87c01179 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1673</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1673" source="CVE"/>
	<description>
	The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03ce55a17ff56088bbdc53d2ba061f4d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048728" comment="kernel-rt less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048729" comment="kernel-rt_debug less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048730" comment="kernel-rt_timing less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048731" comment="kernel-source less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048732" comment="kernel-syms less than 2.6.22.19-0.15"/>
		</criteria>
	</criteria>
	<!-- 16c9561173f6bcfccc30161da1dcd208 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048739" comment="kernel-xenpae less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- 233a5910a88f0bf42279ffd84e4a5140 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 3276f37f75cc08a5c448154a6a6c031c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 5e8c429ac407ead6820878090901b73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 5f023b1674833357edde4fe75478d5b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048010" comment="kernel-xen less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048011" comment="kernel-xenpae less than 2.6.16.60-0.29"/>
		</criteria>
	</criteria>
	<!-- 6294454605fd9887f3377735a3c1b830 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 718b6702959f49befc427f8e908e1ce1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048029" comment="kernel-debug less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048030" comment="kernel-kdump less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048028" comment="kernel-xen less than 2.6.16.60-0.30"/>
		</criteria>
	</criteria>
	<!-- 80584d28331d8bb57344e54489b5e1e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048728" comment="kernel-rt less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048751" comment="kernel-rt_bigsmp less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048729" comment="kernel-rt_debug less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048730" comment="kernel-rt_timing less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048731" comment="kernel-source less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048732" comment="kernel-syms less than 2.6.22.19-0.15"/>
		</criteria>
	</criteria>
	<!-- 8f81a57487eb7e634b38c9359fc25d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047591" comment="kernel-rt less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047592" comment="kernel-rt_bigsmp less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047593" comment="kernel-rt_debug less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047594" comment="kernel-rt_timing less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047595" comment="kernel-source less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047596" comment="kernel-syms less than 2.6.22.19-0.18"/>
		</criteria>
	</criteria>
	<!-- 9b665aac984a0b06dae395f7e6fc9e7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- bc1f88632515826f7b9f2f43cddfbe8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
	</criteria>
	<!-- dd4ff74b273d12c2372f78981ed28f80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048755" comment="kernel-xenpae less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- e71e059b0b1b921d1a3b888f17f527a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- ee7e254f1ae1a2b7b1e639bc87c01179 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1679</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1679" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in Python before 2.5.3 allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted images that trigger heap-based buffer overflows.  NOTE: this issue is due to an incomplete fix for CVE-2007-4965.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048782" comment="python-demo less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048776" comment="python-devel less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048783" comment="python-doc-pdf less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048784" comment="python-doc less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048785" comment="python-idle less than 2.4.2-18.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1686</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1686" source="CVE"/>
	<description>
	Array index vulnerability in Speex 1.1.12 and earlier, as used in libfishsound 0.9.0 and earlier, including Illiminable DirectShow Filters and Annodex Plugins for Firefox, xine-lib before 1.1.12, and many other products, allows remote attackers to execute arbitrary code via a header structure containing a negative offset, which is used to dereference a function pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1289b0411f53ac52a0899d9ab151688d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048811" comment="speex-32bit less than 1.0.5-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048814" comment="speex-64bit less than 1.0.5-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048812" comment="speex-devel less than 1.0.5-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048815" comment="speex-x86 less than 1.0.5-14.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048813" comment="speex less than 1.0.5-14.9"/>
		</criteria>
	</criteria>
	<!-- 664844ff435a661c6e306d20d5ffcd5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048819" comment="vorbis-tools less than 1.1.1-13.7"/>
	</criteria>
	<!-- bdc2ebe4851477274efd45803df68bae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048841" comment="xine-devel less than 1.1.1-24.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048844" comment="xine-extra less than 1.1.1-24.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048842" comment="xine-lib-32bit less than 1.1.1-24.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048845" comment="xine-lib-64bit less than 1.1.1-24.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048846" comment="xine-lib-x86 less than 1.1.1-24.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048843" comment="xine-lib less than 1.1.1-24.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048847" comment="xine-ui less than 0.99.4-32.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1801</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1801" source="CVE"/>
	<description>
	Integer underflow in the iso_recv_msg function (iso.c) in rdesktop 1.5.0 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a Remote Desktop Protocol (RDP) request with a small length field.
	</description>
 </metadata>
<!-- 2ed5c86f0e9d2f85a40536ac731afd98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048889" comment="rdesktop less than 1.4.1-17.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1802</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1802" source="CVE"/>
	<description>
	Buffer overflow in the process_redirect_pdu (rdp.c) function in rdesktop 1.5.0 allows remote attackers to execute arbitrary code via a Remote Desktop Protocol (RDP) redirect request with modified length fields.
	</description>
 </metadata>
<!-- 2ed5c86f0e9d2f85a40536ac731afd98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048889" comment="rdesktop less than 1.4.1-17.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1803</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1803" source="CVE"/>
	<description>
	Integer signedness error in the xrealloc function (rdesktop.c) in RDesktop 1.5.0 allows remote attackers to execute arbitrary code via unknown parameters that trigger a heap-based overflow.  NOTE: the role of the channel_process function was not specified by the original researcher.
	</description>
 </metadata>
<!-- 2ed5c86f0e9d2f85a40536ac731afd98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048889" comment="rdesktop less than 1.4.1-17.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1878</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1878" source="CVE"/>
	<description>
	Stack-based buffer overflow in the demux_nsf_send_chunk function in src/demuxers/demux_nsf.c in xine-lib 1.1.12 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long NSF title.
	</description>
 </metadata>
<!-- bdc2ebe4851477274efd45803df68bae -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048841" comment="xine-devel less than 1.1.1-24.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048844" comment="xine-extra less than 1.1.1-24.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048842" comment="xine-lib-32bit less than 1.1.1-24.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048845" comment="xine-lib-64bit less than 1.1.1-24.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048846" comment="xine-lib-x86 less than 1.1.1-24.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048843" comment="xine-lib less than 1.1.1-24.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048847" comment="xine-ui less than 0.99.4-32.36"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1887</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1887" source="CVE"/>
	<description>
	Python 2.5.2 and earlier allows context-dependent attackers to execute arbitrary code via multiple vectors that cause a negative size value to be provided to the PyString_FromStringAndSize function, which allocates less memory than expected when assert() is disabled and triggers a buffer overflow.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048782" comment="python-demo less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048776" comment="python-devel less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048783" comment="python-doc-pdf less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048784" comment="python-doc less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048785" comment="python-idle less than 2.4.2-18.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1891</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1891" source="CVE"/>
	<description>
	Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20081945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-1945</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1945" source="CVE"/>
	<description>
	QEMU 0.9.0 does not properly handle changes to removable media, which allows guest OS users to read arbitrary files on the host OS by using the diskformat: parameter in the -usbdevice option to modify the disk-image header to identify a different format, a related issue to CVE-2008-2004.
	</description>
 </metadata>
<!-- 816577e14f3b7b0abdb6d607f482c9a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048155" comment="qemu less than 0.8.2-37.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2050</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2050" source="CVE"/>
	<description>
	Stack-based buffer overflow in the FastCGI SAPI (fastcgi.c) in PHP before 5.2.6 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- f40fbf7e9f8c3e69a8cb026afa49aadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048089" comment="apache2-mod_php5 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048090" comment="php5-bcmath less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048091" comment="php5-bz2 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048092" comment="php5-calendar less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048093" comment="php5-ctype less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048094" comment="php5-curl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048095" comment="php5-dba less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048096" comment="php5-dbase less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048097" comment="php5-devel less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048098" comment="php5-dom less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048099" comment="php5-exif less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048100" comment="php5-fastcgi less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048101" comment="php5-ftp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048102" comment="php5-gd less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048103" comment="php5-gettext less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048104" comment="php5-gmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048105" comment="php5-iconv less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048106" comment="php5-imap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048108" comment="php5-ldap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048109" comment="php5-mbstring less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048110" comment="php5-mcrypt less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048111" comment="php5-mhash less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048112" comment="php5-mysql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048113" comment="php5-ncurses less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048114" comment="php5-odbc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048115" comment="php5-openssl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048116" comment="php5-pcntl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048117" comment="php5-pdo less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048118" comment="php5-pear less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048119" comment="php5-pgsql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048120" comment="php5-posix less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048121" comment="php5-pspell less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048122" comment="php5-shmop less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048123" comment="php5-snmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048124" comment="php5-soap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048125" comment="php5-sockets less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048126" comment="php5-sqlite less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048127" comment="php5-suhosin less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048128" comment="php5-sysvmsg less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048129" comment="php5-sysvsem less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048130" comment="php5-sysvshm less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048137" comment="php5-tidy less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048131" comment="php5-tokenizer less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048132" comment="php5-wddx less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048133" comment="php5-xmlreader less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048134" comment="php5-xmlrpc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048135" comment="php5-xsl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048136" comment="php5-zlib less than 5.2.5-9.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2051</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2051" source="CVE"/>
	<description>
	The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to "incomplete multibyte chars."
	</description>
 </metadata>
<!-- f40fbf7e9f8c3e69a8cb026afa49aadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048089" comment="apache2-mod_php5 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048090" comment="php5-bcmath less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048091" comment="php5-bz2 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048092" comment="php5-calendar less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048093" comment="php5-ctype less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048094" comment="php5-curl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048095" comment="php5-dba less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048096" comment="php5-dbase less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048097" comment="php5-devel less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048098" comment="php5-dom less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048099" comment="php5-exif less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048100" comment="php5-fastcgi less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048101" comment="php5-ftp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048102" comment="php5-gd less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048103" comment="php5-gettext less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048104" comment="php5-gmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048105" comment="php5-iconv less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048106" comment="php5-imap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048108" comment="php5-ldap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048109" comment="php5-mbstring less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048110" comment="php5-mcrypt less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048111" comment="php5-mhash less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048112" comment="php5-mysql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048113" comment="php5-ncurses less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048114" comment="php5-odbc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048115" comment="php5-openssl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048116" comment="php5-pcntl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048117" comment="php5-pdo less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048118" comment="php5-pear less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048119" comment="php5-pgsql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048120" comment="php5-posix less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048121" comment="php5-pspell less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048122" comment="php5-shmop less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048123" comment="php5-snmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048124" comment="php5-soap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048125" comment="php5-sockets less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048126" comment="php5-sqlite less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048127" comment="php5-suhosin less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048128" comment="php5-sysvmsg less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048129" comment="php5-sysvsem less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048130" comment="php5-sysvshm less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048137" comment="php5-tidy less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048131" comment="php5-tokenizer less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048132" comment="php5-wddx less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048133" comment="php5-xmlreader less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048134" comment="php5-xmlrpc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048135" comment="php5-xsl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048136" comment="php5-zlib less than 5.2.5-9.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2079</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2079" source="CVE"/>
	<description>
	MySQL 4.1.x before 4.1.24, 5.0.x before 5.0.60, 5.1.x before 5.1.24, and 6.0.x before 6.0.5 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are within the MySQL home data directory, which can point to tables that are created in the future.
	</description>
 </metadata>
<!-- 30a5e3996d30fa92e0adac8c1dafa7ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009043025" comment="mysql-Max less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043028" comment="mysql-bench less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043016" comment="mysql-client less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043017" comment="mysql-devel less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043018" comment="mysql-shared-32bit less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043026" comment="mysql-shared-64bit less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043027" comment="mysql-shared-x86 less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043019" comment="mysql-shared less than 5.0.26-12.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043020" comment="mysql less than 5.0.26-12.20"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2086</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-2086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2086" source="CVE"/>
	<description>
	Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka "Java Web Start File Inclusion" and CR 6694892.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2108</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2108" source="CVE"/>
	<description>
	The GENERATE_SEED macro in PHP 4.x before 4.4.8 and 5.x before 5.2.5, when running on 64-bit systems, performs a multiplication that generates a portion of zero bits during conversion due to insufficient precision, which produces 24 bits of entropy and simplifies brute force attacks against protection mechanisms that use the rand and mt_rand functions.
	</description>
 </metadata>
<!-- f40fbf7e9f8c3e69a8cb026afa49aadb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048089" comment="apache2-mod_php5 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048090" comment="php5-bcmath less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048091" comment="php5-bz2 less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048092" comment="php5-calendar less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048093" comment="php5-ctype less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048094" comment="php5-curl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048095" comment="php5-dba less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048096" comment="php5-dbase less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048097" comment="php5-devel less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048098" comment="php5-dom less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048099" comment="php5-exif less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048100" comment="php5-fastcgi less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048101" comment="php5-ftp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048102" comment="php5-gd less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048103" comment="php5-gettext less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048104" comment="php5-gmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048105" comment="php5-iconv less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048106" comment="php5-imap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048108" comment="php5-ldap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048109" comment="php5-mbstring less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048110" comment="php5-mcrypt less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048111" comment="php5-mhash less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048112" comment="php5-mysql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048113" comment="php5-ncurses less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048114" comment="php5-odbc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048115" comment="php5-openssl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048116" comment="php5-pcntl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048117" comment="php5-pdo less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048118" comment="php5-pear less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048119" comment="php5-pgsql less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048120" comment="php5-posix less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048121" comment="php5-pspell less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048122" comment="php5-shmop less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048123" comment="php5-snmp less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048124" comment="php5-soap less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048125" comment="php5-sockets less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048126" comment="php5-sqlite less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048127" comment="php5-suhosin less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048128" comment="php5-sysvmsg less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048129" comment="php5-sysvsem less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048130" comment="php5-sysvshm less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048137" comment="php5-tidy less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048131" comment="php5-tokenizer less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048132" comment="php5-wddx less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048133" comment="php5-xmlreader less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048134" comment="php5-xmlrpc less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048135" comment="php5-xsl less than 5.2.5-9.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048136" comment="php5-zlib less than 5.2.5-9.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2136</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2136" source="CVE"/>
	<description>
	Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 2.4.36.5 and 2.6 before 2.6.25.3 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT) tunnel interface, related to the pskb_may_pull and kfree_skb functions, and management of an skb reference count.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 03ce55a17ff56088bbdc53d2ba061f4d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048728" comment="kernel-rt less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048729" comment="kernel-rt_debug less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048730" comment="kernel-rt_timing less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048731" comment="kernel-source less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048732" comment="kernel-syms less than 2.6.22.19-0.15"/>
		</criteria>
	</criteria>
	<!-- 0458a1cb40f970a131f8d89c5d6be125 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049024" comment="kernel-debug less than 2.6.16.60-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049025" comment="kernel-kdump less than 2.6.16.60-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049023" comment="kernel-xen less than 2.6.16.60-0.23"/>
		</criteria>
	</criteria>
	<!-- 80584d28331d8bb57344e54489b5e1e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048728" comment="kernel-rt less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048751" comment="kernel-rt_bigsmp less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048729" comment="kernel-rt_debug less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048730" comment="kernel-rt_timing less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048731" comment="kernel-source less than 2.6.22.19-0.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048732" comment="kernel-syms less than 2.6.22.19-0.15"/>
		</criteria>
	</criteria>
	<!-- 9a7b2285c7996f094834fbc31c4d0281 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049024" comment="kernel-debug less than 2.6.16.60-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049025" comment="kernel-kdump less than 2.6.16.60-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049023" comment="kernel-xen less than 2.6.16.60-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049027" comment="kernel-xenpae less than 2.6.16.60-0.23"/>
		</criteria>
	</criteria>
	<!-- be9bdee352d3f3ff6b7082d533344284 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049024" comment="kernel-debug less than 2.6.16.60-0.23"/>
	</criteria>
	<!-- ffb102a42d33117c1f38f92c51858fed -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049025" comment="kernel-kdump less than 2.6.16.60-0.23"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2142</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2142" source="CVE"/>
	<description>
	Emacs 21 and XEmacs automatically load and execute .flc (fast lock) files that are associated with other files that are edited within Emacs, which allows user-assisted attackers to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8b4e01c23fe7276d93dfea566a2ac5c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049036" comment="emacs-el less than 21.3-224.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049037" comment="emacs-nox less than 21.3-224.17"/>
		</criteria>
	</criteria>
	<!-- c589eb30ceffe784e918b3b81ea53552 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049043" comment="xemacs-packages-el less than 20051208-18.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049041" comment="xemacs-packages-info less than 20051208-18.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049042" comment="xemacs-packages less than 20051208-18.8"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2235</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2235" source="CVE"/>
	<description>
	OpenSC before 0.11.5 uses weak permissions (ADMIN file control information of 00) for the 5015 directory on smart cards and USB crypto tokens running Siemens CardOS M4, which allows physically proximate attackers to change the PIN.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 093ac65717da9e9a9950e72fd32a5327 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049055" comment="opensc-32bit less than 0.9.6-17.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049058" comment="opensc-devel less than 0.9.6-17.7"/>
		</criteria>
	</criteria>
	<!-- 182cb577da1e92564cd020859d8e8f5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049060" comment="opensc-32bit less than 0.9.6-17.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049063" comment="opensc-devel less than 0.9.6-17.9"/>
		</criteria>
	</criteria>
	<!-- c3fd31aad32a3c9d1c57dd1c890137ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049060" comment="opensc-32bit less than 0.9.6-17.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049063" comment="opensc-devel less than 0.9.6-17.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2292</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2292" source="CVE"/>
	<description>
	Buffer overflow in the __snprint_value function in snmp_get in Net-SNMP 5.1.4, 5.2.4, and 5.4.1, as used in SNMP.xs for Perl, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large OCTETSTRING in an attribute value pair (AVP).
	</description>
 </metadata>
<!-- 71093bdfd49361f6dbe32a8fde43b848 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048182" comment="net-snmp-devel-64bit less than 5.3.0.1-25.26"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048175" comment="net-snmp-devel less than 5.3.0.1-25.26"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2315</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2315" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2315" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.5.2 and earlier allow context-dependent attackers to have an unknown impact via vectors related to the (1) stringobject, (2) unicodeobject, (3) bufferobject, (4) longobject, (5) tupleobject, (6) stropmodule, (7) gcmodule, and (8) mmapmodule modules.  NOTE: The expandtabs integer overflows in stringobject and unicodeobject in 2.5.2 are covered by CVE-2008-5031.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048782" comment="python-demo less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048776" comment="python-devel less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048783" comment="python-doc-pdf less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048784" comment="python-doc less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048785" comment="python-idle less than 2.4.2-18.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2316</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2316" source="CVE"/>
	<description>
	Integer overflow in _hashopenssl.c in the hashlib module in Python 2.5.2 and earlier might allow context-dependent attackers to defeat cryptographic digests, related to "partial hashlib hashing of data exceeding 4GB."
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048782" comment="python-demo less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048776" comment="python-devel less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048783" comment="python-doc-pdf less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048784" comment="python-doc less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048785" comment="python-idle less than 2.4.2-18.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2327</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2327" source="CVE"/>
	<description>
	Multiple buffer underflows in the (1) LZWDecode, (2) LZWDecodeCompat, and (3) LZWDecodeVector functions in tif_lzw.c in the LZW decoder in LibTIFF 3.8.2 and earlier allow context-dependent attackers to execute arbitrary code via a crafted TIFF file, related to improper handling of the CODE_CLEAR code.
	</description>
 </metadata>
<!-- 6ad5a94fc892aa5c6aeb1f575178024c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049253" comment="libtiff-devel-32bit less than 3.8.2-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049254" comment="libtiff-devel-64bit less than 3.8.2-5.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049250" comment="libtiff-devel less than 3.8.2-5.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2357</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2357" source="CVE"/>
	<description>
	Stack-based buffer overflow in the split_redraw function in split.c in mtr before 0.73, when invoked with the -p (aka --split) option, allows remote attackers to execute arbitrary code via a crafted DNS PTR record.  NOTE: it could be argued that this is a vulnerability in the ns_name_ntop function in resolv/ns_name.c in glibc and the proper fix should be in glibc; if so, then this should not be treated as a vulnerability in mtr.
	</description>
 </metadata>
<!-- c523fd7ace695c004442429702123467 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049256" comment="mtr-gtk less than 0.69-18.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049257" comment="mtr less than 0.69-18.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2360</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2360" source="CVE"/>
	<description>
	Integer overflow in the AllocateGlyph function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to execute arbitrary code via unspecified request fields that are used to calculate a heap buffer size, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 365f4578a5d4944409898142a04ad8db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
	<!-- 5e89cd8e51d8102f337a87a07775572b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048482" comment="xgl less than cvs_060522-0.44"/>
	</criteria>
	<!-- dafe815cdb6284ae29e4d625d49fd383 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2361</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2361" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2361" source="CVE"/>
	<description>
	Integer overflow in the ProcRenderCreateCursor function in the Render extension in the X server 1.4 in X.Org X11R7.3 allows context-dependent attackers to cause a denial of service (daemon crash) via unspecified request fields that are used to calculate a glyph buffer size, which triggers a dereference of unmapped memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 365f4578a5d4944409898142a04ad8db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
	<!-- 5e89cd8e51d8102f337a87a07775572b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048482" comment="xgl less than cvs_060522-0.44"/>
	</criteria>
	<!-- dafe815cdb6284ae29e4d625d49fd383 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2362</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2362" source="CVE"/>
	<description>
	Multiple integer overflows in the Render extension in the X server 1.4 in X.Org X11R7.3 allow context-dependent attackers to execute arbitrary code via a (1) SProcRenderCreateLinearGradient, (2) SProcRenderCreateRadialGradient, or (3) SProcRenderCreateConicalGradient request with an invalid field specifying the number of bytes to swap in the request data, which triggers heap memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 365f4578a5d4944409898142a04ad8db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
	<!-- 5e89cd8e51d8102f337a87a07775572b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048482" comment="xgl less than cvs_060522-0.44"/>
	</criteria>
	<!-- dafe815cdb6284ae29e4d625d49fd383 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048479" comment="xorg-x11-Xvfb less than 6.9.0-50.60"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2364</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2364" source="CVE"/>
	<description>
	The ap_proxy_http_process_response function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server 2.0.63 and 2.2.8 does not limit the number of forwarded interim responses, which allows remote HTTP servers to cause a denial of service (memory consumption) via a large number of interim responses.
	</description>
 </metadata>
<!-- 8b3fe2617717c12f5d59693544f5db9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049267" comment="apache2-devel less than 2.2.3-16.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049268" comment="apache2-doc less than 2.2.3-16.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049269" comment="apache2-example-pages less than 2.2.3-16.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049270" comment="apache2-prefork less than 2.2.3-16.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049271" comment="apache2-worker less than 2.2.3-16.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049272" comment="apache2 less than 2.2.3-16.21"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2370</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2370" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when a RequestDispatcher is used, performs path normalization before removing the query string from the URI, which allows remote attackers to conduct directory traversal attacks and read arbitrary files via a .. (dot dot) in a request parameter.
	</description>
 </metadata>
<!-- f32e6b4db946948fde53216de5e8e53c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048424" comment="tomcat5-admin-webapps less than 5.0.30-27.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048425" comment="tomcat5-webapps less than 5.0.30-27.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048426" comment="tomcat5 less than 5.0.30-27.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2372</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2372" source="CVE"/>
	<description>
	The Linux kernel 2.6.24 and 2.6.25 before 2.6.25.9 allows local users to cause a denial of service (memory consumption) via a large number of calls to the get_user_pages function, which lacks a ZERO_PAGE optimization and results in allocation of "useless newly zeroed pages."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c9561173f6bcfccc30161da1dcd208 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048739" comment="kernel-xenpae less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- 233a5910a88f0bf42279ffd84e4a5140 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 6294454605fd9887f3377735a3c1b830 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 9b665aac984a0b06dae395f7e6fc9e7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- bc1f88632515826f7b9f2f43cddfbe8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
	</criteria>
	<!-- dd4ff74b273d12c2372f78981ed28f80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048755" comment="kernel-xenpae less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- e71e059b0b1b921d1a3b888f17f527a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- ee7e254f1ae1a2b7b1e639bc87c01179 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2374</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2374" source="CVE"/>
	<description>
	src/sdp.c in bluez-libs 3.30 in BlueZ, and other bluez-libs before 3.34 and bluez-utils before 3.34 versions, does not validate string length fields in SDP packets, which allows remote SDP servers to cause a denial of service or possibly have unspecified other impact via a crafted length field that triggers excessive memory allocation or a buffer over-read.
	</description>
 </metadata>
<!-- 7f0fe6dd1e4c80c40834a12dae9e03f8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049296" comment="bluez-cups less than 2.24-17.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049297" comment="bluez-libs less than 2.24-12.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049298" comment="bluez-utils less than 2.24-17.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2375</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2375" source="CVE"/>
	<description>
	Memory leak in a certain Red Hat deployment of vsftpd before 2.0.5 on Red Hat Enterprise Linux (RHEL) 3 and 4, when PAM is used, allows remote attackers to cause a denial of service (memory consumption) via a large number of invalid authentication attempts within the same session, a different vulnerability than CVE-2007-5962.
	</description>
 </metadata>
<!-- 8475be9d68f167f402e906db30c2365f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049299" comment="vsftpd less than 2.0.4-19.18"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2382</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2382" source="CVE"/>
	<description>
	The protocol_client_msg function in vnc.c in the VNC server in (1) Qemu 0.9.1 and earlier and (2) KVM kvm-79 and earlier allows remote attackers to cause a denial of service (infinite loop) via a certain message.
	</description>
 </metadata>
<!-- 816577e14f3b7b0abdb6d607f482c9a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048155" comment="qemu less than 0.8.2-37.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2384</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2008-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2384" source="CVE"/>
	<description>
	SQL injection vulnerability in mod_auth_mysql.c in the mod-auth-mysql (aka libapache2-mod-auth-mysql) module for the Apache HTTP Server 2.x, when configured to use a multibyte character set that allows a \ (backslash) as part of the character encoding, allows remote attackers to execute arbitrary SQL commands via unspecified inputs in a login request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5860407cc1940ffaa3bf2e136fd703ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070138" comment="apache2-mod_auth_mysql less than 3.0.0-14.9.1"/>
	</criteria>
	<!-- 631dcbc5372e1303ee703464037ecef1 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070138" comment="apache2-mod_auth_mysql less than 3.0.0-14.9.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2426</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2426" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in Imlib 2 (aka imlib2) 1.4.0 allow user-assisted remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) a PNM image with a crafted header, related to the load function in src/modules/loaders/loader_pnm.c; or (2) a crafted XPM image, related to the load function in src/modules/loader_xpm.c.
	</description>
 </metadata>
<!-- 2b0754cea6ca770cb87af749eb9bace3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049326" comment="imlib2-devel less than 1.2.1-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049327" comment="imlib2-loaders less than 1.2.1-17.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049328" comment="imlib2 less than 1.2.1-17.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2662</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2662" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_str_buf_append function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors that trigger memory corruption, a different issue than CVE-2008-2663, CVE-2008-2664, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. This CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2663</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2663" source="CVE"/>
	<description>
	Multiple integer overflows in the rb_ary_store function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22 allow context-dependent attackers to execute arbitrary code or cause a denial of service via unknown vectors, a different issue than CVE-2008-2662, CVE-2008-2664, and CVE-2008-2725. NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2664</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2664" source="CVE"/>
	<description>
	The rb_str_format function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2 allows context-dependent attackers to trigger memory corruption via unspecified vectors related to alloca, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2725.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2712</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2712" source="CVE"/>
	<description>
	Vim 7.1.314, 6.4, and other versions allows user-assisted remote attackers to execute arbitrary commands via Vim scripts that do not properly sanitize inputs before invoking the execute or system functions, as demonstrated using (1) filetype.vim, (3) xpm.vim, (4) gzip_vim, and (5) netrw.  NOTE: the originally reported version was 7.1.314, but the researcher actually found this set of issues in 7.1.298.  NOTE: the zipplugin issue (originally vector 2 in this identifier) has been subsumed by CVE-2008-3075.
	</description>
 </metadata>
<!-- a602d638015fb430b52467b3602420eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049363" comment="gvim less than 6.4.6-19.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2713</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2713" source="CVE"/>
	<description>
	libclamav/petite.c in ClamAV before 0.93.1 allows remote attackers to cause a denial of service via a crafted Petite file that triggers an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27657e0c996e172b8f81f4ffbd5b67b3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049364" comment="clamav less than 0.93.1-0.2"/>
	</criteria>
	<!-- 8e8b2a1607c3bfd1b39d6fcef8f15d37 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049365" comment="clamav less than 0.93.3-0.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2725</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2725" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, and 1.8.7 before 1.8.7-p22; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption via unspecified vectors, aka the "REALLOC_N" variant, a different issue than CVE-2008-2662, CVE-2008-2663, and CVE-2008-2664.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2726</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2726" source="CVE"/>
	<description>
	Integer overflow in the (1) rb_ary_splice function in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2; and (2) the rb_ary_replace function in 1.6.x allows context-dependent attackers to trigger memory corruption, aka the "beg + rlen" issue.  NOTE: as of 20080624, there has been inconsistent usage of multiple CVE identifiers related to Ruby. The CVE description should be regarded as authoritative, although it is likely to change.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2727</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2727" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2727" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2725.  Reason: This candidate is a duplicate of CVE-2008-2725.  Notes: All CVE users should reference CVE-2008-2725 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2728</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2728" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2008-2726.  Reason: This candidate is a duplicate of CVE-2008-2726.  Notes: All CVE users should reference CVE-2008-2726 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 1e97d8857586ea9f95ec44eb9c68dfe8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048362" comment="ruby-devel less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048363" comment="ruby-doc-html less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048364" comment="ruby-doc-ri less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048365" comment="ruby-examples less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048366" comment="ruby-test-suite less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048367" comment="ruby-tk less than 1.8.4-17.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048361" comment="ruby less than 1.8.4-17.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2729</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2729" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2729" source="CVE"/>
	<description>
	arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.
	</description>
 </metadata>
<!-- 718b6702959f49befc427f8e908e1ce1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048029" comment="kernel-debug less than 2.6.16.60-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048030" comment="kernel-kdump less than 2.6.16.60-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048028" comment="kernel-xen less than 2.6.16.60-0.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2812</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2812" source="CVE"/>
	<description>
	The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c9561173f6bcfccc30161da1dcd208 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048739" comment="kernel-xenpae less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- 233a5910a88f0bf42279ffd84e4a5140 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 6294454605fd9887f3377735a3c1b830 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 6d497073fd4b9b53f8a9864dca5b5fcc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049400" comment="kernel-rt less than 2.6.22.19-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049401" comment="kernel-rt_bigsmp less than 2.6.22.19-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049402" comment="kernel-rt_debug less than 2.6.22.19-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049403" comment="kernel-rt_timing less than 2.6.22.19-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049404" comment="kernel-source less than 2.6.22.19-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049405" comment="kernel-syms less than 2.6.22.19-0.16"/>
		</criteria>
	</criteria>
	<!-- 9b665aac984a0b06dae395f7e6fc9e7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- bc1f88632515826f7b9f2f43cddfbe8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
	</criteria>
	<!-- dd4ff74b273d12c2372f78981ed28f80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048755" comment="kernel-xenpae less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- e71e059b0b1b921d1a3b888f17f527a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- ee7e254f1ae1a2b7b1e639bc87c01179 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2826</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2826" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2826" source="CVE"/>
	<description>
	Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure.
	</description>
 </metadata>
<!-- 6d497073fd4b9b53f8a9864dca5b5fcc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049400" comment="kernel-rt less than 2.6.22.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049401" comment="kernel-rt_bigsmp less than 2.6.22.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049402" comment="kernel-rt_debug less than 2.6.22.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049403" comment="kernel-rt_timing less than 2.6.22.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049404" comment="kernel-source less than 2.6.22.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049405" comment="kernel-syms less than 2.6.22.19-0.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2927</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2927" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2927" source="CVE"/>
	<description>
	Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.4.3 and Adium before 1.3 allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, a different vulnerability than CVE-2008-2955.
	</description>
 </metadata>
<!-- 3958fddec2f2300979834d9248cbb5ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049462" comment="finch-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049459" comment="finch less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049463" comment="libpurple-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049460" comment="libpurple less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049464" comment="pidgin-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049461" comment="pidgin less than 2.3.1-10.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2931</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2931" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2931" source="CVE"/>
	<description>
	The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16c9561173f6bcfccc30161da1dcd208 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048739" comment="kernel-xenpae less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- 233a5910a88f0bf42279ffd84e4a5140 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 6294454605fd9887f3377735a3c1b830 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
	</criteria>
	<!-- 9b665aac984a0b06dae395f7e6fc9e7e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048738" comment="kernel-xen less than 2.6.16.60-0.27"/>
		</criteria>
	</criteria>
	<!-- bc1f88632515826f7b9f2f43cddfbe8e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048740" comment="kernel-debug less than 2.6.16.60-0.27"/>
	</criteria>
	<!-- dd4ff74b273d12c2372f78981ed28f80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048755" comment="kernel-xenpae less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- e71e059b0b1b921d1a3b888f17f527a2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048750" comment="kernel-debug less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048746" comment="kernel-kdump less than 2.6.16.60-0.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048754" comment="kernel-xen less than 2.6.16.60-0.25"/>
		</criteria>
	</criteria>
	<!-- ee7e254f1ae1a2b7b1e639bc87c01179 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048741" comment="kernel-kdump less than 2.6.16.60-0.27"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2938</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2938" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 4.1.0 through 4.1.37, 5.5.0 through 5.5.26, and 6.0.0 through 6.0.16, when allowLinking and UTF-8 are enabled, allows remote attackers to read arbitrary files via encoded directory traversal sequences in the URI, a different vulnerability than CVE-2008-2370.  NOTE: versions earlier than 6.0.18 were reported affected, but the vendor advisory lists 6.0.16 as the last affected version.
	</description>
 </metadata>
<!-- f32e6b4db946948fde53216de5e8e53c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048424" comment="tomcat5-admin-webapps less than 5.0.30-27.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048425" comment="tomcat5-webapps less than 5.0.30-27.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048426" comment="tomcat5 less than 5.0.30-27.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2939</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2939" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in proxy_ftp.c in the mod_proxy_ftp module in Apache 2.0.63 and earlier, and mod_proxy_ftp.c in the mod_proxy_ftp module in Apache 2.2.9 and earlier 2.2 versions, allows remote attackers to inject arbitrary web script or HTML via a wildcard in the last directory component in the pathname in an FTP URI.
	</description>
 </metadata>
<!-- 8c2a00b08b0a861926f7e3f8eb433ce9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047494" comment="apache2-devel less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047495" comment="apache2-doc less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047496" comment="apache2-example-pages less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047497" comment="apache2-prefork less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047498" comment="apache2-worker less than 2.2.3-16.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047499" comment="apache2 less than 2.2.3-16.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2952</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2952" source="CVE"/>
	<description>
	liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
	</description>
 </metadata>
<!-- da48a44725c6492d098066cb53b194a6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049555" comment="openldap2-back-meta less than 2.3.32-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049556" comment="openldap2-back-perl less than 2.3.32-0.30"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20082955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-2955</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2955" source="CVE"/>
	<description>
	Pidgin 2.4.1 allows remote attackers to cause a denial of service (crash) via a long filename that contains certain characters, as demonstrated using an MSN message that triggers the crash in the msn_slplink_process_msg function.
	</description>
 </metadata>
<!-- 3958fddec2f2300979834d9248cbb5ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049462" comment="finch-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049459" comment="finch less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049463" comment="libpurple-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049460" comment="libpurple less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049464" comment="pidgin-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049461" comment="pidgin less than 2.3.1-10.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3104</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3104" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allow remote attackers to violate the security model for an applet's outbound connections by connecting to localhost services running on the machine that loaded the applet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43611872eac06dc35f1c7183ae1db620 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049575" comment="java-1_4_2-ibm-devel less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049576" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049577" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049578" comment="java-1_4_2-ibm less than 1.4.2_sr12-0.4"/>
		</criteria>
	</criteria>
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3106</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3106" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Runtime Environment (JRE) in JDK and JRE 6 Update 6 and earlier and JDK and JRE 5.0 Update 15 and earlier allows remote attackers to access URLs via unknown vectors involving processing of XML data by an untrusted (1) application or (2) applet, a different vulnerability than CVE-2008-3105.
	</description>
 </metadata>
<!-- c75f99d8e875876c1432cb28ca2d13b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047000" comment="java-1_4_2-ibm-devel less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047001" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047002" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047003" comment="java-1_4_2-ibm less than 1.4.2_sr11-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3108</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3108" source="CVE"/>
	<description>
	Buffer overflow in Sun Java Runtime Environment (JRE) in JDK and JRE 5.0 before Update 10, SDK and JRE 1.4.x before 1.4.2_18, and SDK and JRE 1.3.x before 1.3.1_23 allows context-dependent attackers to gain privileges via unspecified vectors related to font processing.
	</description>
 </metadata>
<!-- c75f99d8e875876c1432cb28ca2d13b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047000" comment="java-1_4_2-ibm-devel less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047001" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047002" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047003" comment="java-1_4_2-ibm less than 1.4.2_sr11-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3111</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3111" source="CVE"/>
	<description>
	Multiple buffer overflows in Sun Java Web Start in JDK and JRE 6 before Update 4, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allow context-dependent attackers to gain privileges via an untrusted application, as demonstrated by (a) an application that grants itself privileges to (1) read local files, (2) write to local files, or (3) execute local programs; and as demonstrated by (b) a long value associated with a java-vm-args attribute in a j2se tag in a JNLP file, which triggers a stack-based buffer overflow in the GetVMArgsOption function; aka CR 6557220.
	</description>
 </metadata>
<!-- c75f99d8e875876c1432cb28ca2d13b0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047000" comment="java-1_4_2-ibm-devel less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047001" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047002" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr11-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047003" comment="java-1_4_2-ibm less than 1.4.2_sr11-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3112</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3112" source="CVE"/>
	<description>
	Directory traversal vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create arbitrary files via the writeManifest method in the CacheEntry class, aka CR 6703909.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43611872eac06dc35f1c7183ae1db620 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049575" comment="java-1_4_2-ibm-devel less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049576" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049577" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049578" comment="java-1_4_2-ibm less than 1.4.2_sr12-0.4"/>
		</criteria>
	</criteria>
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3113</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3113" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 5.0 before Update 16 and SDK and JRE 1.4.x before 1.4.2_18 allows remote attackers to create or delete arbitrary files via an untrusted application, aka CR 6704077.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43611872eac06dc35f1c7183ae1db620 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049575" comment="java-1_4_2-ibm-devel less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049576" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049577" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049578" comment="java-1_4_2-ibm less than 1.4.2_sr12-0.4"/>
		</criteria>
	</criteria>
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3114</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-3114" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3114" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java Web Start in JDK and JRE 6 before Update 7, JDK and JRE 5.0 before Update 16, and SDK and JRE 1.4.x before 1.4.2_18 allows context-dependent attackers to obtain sensitive information (the cache location) via an untrusted application, aka CR 6704074.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43611872eac06dc35f1c7183ae1db620 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049575" comment="java-1_4_2-ibm-devel less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049576" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049577" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr12-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049578" comment="java-1_4_2-ibm less than 1.4.2_sr12-0.4"/>
		</criteria>
	</criteria>
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3137</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3137" source="CVE"/>
	<description>
	The GSM SMS dissector in Wireshark (formerly Ethereal) 0.99.2 through 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049630" comment="ethereal-devel less than 0.10.14-16.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3138</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3138" source="CVE"/>
	<description>
	The (1) PANA and (2) KISMET dissectors in Wireshark (formerly Ethereal) 0.99.3 through 1.0.0 allow remote attackers to cause a denial of service (application stop) via unknown vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049630" comment="ethereal-devel less than 0.10.14-16.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3139</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3139" source="CVE"/>
	<description>
	The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.  NOTE: this might be due to a use-after-free error.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049630" comment="ethereal-devel less than 0.10.14-16.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3140</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3140" source="CVE"/>
	<description>
	The syslog dissector in Wireshark (formerly Ethereal) 1.0.0 allows remote attackers to cause a denial of service (application crash) via unknown vectors, possibly related to an "incomplete SS7 MSU syslog encapsulated packet."
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049630" comment="ethereal-devel less than 0.10.14-16.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3141</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3141" source="CVE"/>
	<description>
	Unspecified vulnerability in the RMI dissector in Wireshark (formerly Ethereal) 0.9.5 through 1.0.0 allows remote attackers to read system memory via unspecified vectors.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049630" comment="ethereal-devel less than 0.10.14-16.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3142</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3142" source="CVE"/>
	<description>
	Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048782" comment="python-demo less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048776" comment="python-devel less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048783" comment="python-doc-pdf less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048784" comment="python-doc less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048785" comment="python-idle less than 2.4.2-18.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3143</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3143" source="CVE"/>
	<description>
	Multiple integer overflows in Python before 2.5.2 might allow context-dependent attackers to have an unknown impact via vectors related to (1) Include/pymem.h; (2) _csv.c, (3) _struct.c, (4) arraymodule.c, (5) audioop.c, (6) binascii.c, (7) cPickle.c, (8) cStringIO.c, (9) cjkcodecs/multibytecodec.c, (10) datetimemodule.c, (11) md5.c, (12) rgbimgmodule.c, and (13) stropmodule.c in Modules/; (14) bufferobject.c, (15) listobject.c, and (16) obmalloc.c in Objects/; (17) Parser/node.c; and (18) asdl.c, (19) ast.c, (20) bltinmodule.c, and (21) compile.c in Python/, as addressed by "checks for integer overflows, contributed by Google."
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048782" comment="python-demo less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048776" comment="python-devel less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048783" comment="python-doc-pdf less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048784" comment="python-doc less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048785" comment="python-idle less than 2.4.2-18.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3144</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3144" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3144" source="CVE"/>
	<description>
	Multiple integer overflows in the PyOS_vsnprintf function in Python/mysnprintf.c in Python 2.5.2 and earlier allow context-dependent attackers to cause a denial of service (memory corruption) or have unspecified other impact via crafted input to string formatting operations.  NOTE: the handling of certain integer values is also affected by related integer underflows and an off-by-one error.
	</description>
 </metadata>
<!-- c1c51f74ac5868675063af2a6018cb5f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009048782" comment="python-demo less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048776" comment="python-devel less than 2.4.2-18.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048783" comment="python-doc-pdf less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048784" comment="python-doc less than 2.4.2-18.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048785" comment="python-idle less than 2.4.2-18.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3145</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3145" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3145" source="CVE"/>
	<description>
	The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049630" comment="ethereal-devel less than 0.10.14-16.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3146</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3146" source="CVE"/>
	<description>
	Multiple buffer overflows in packet_ncp2222.inc in Wireshark (formerly Ethereal) 0.9.7 through 1.0.2 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted NCP packet that causes an invalid pointer to be used.
	</description>
 </metadata>
<!-- 1e9c12e8e40b1a82250c9f63d0e5c302 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049630" comment="ethereal-devel less than 0.10.14-16.26"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3231</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3231" source="CVE"/>
	<description>
	xine-lib before 1.1.15 allows remote attackers to cause a denial of service (crash) via a crafted OGG file, as demonstrated by playing lol-ffplay.ogg with xine.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3271</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3271" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a "synchronization problem" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve.
	</description>
 </metadata>
<!-- a0d2a54336e5b511bf7030599e964987 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049662" comment="tomcat5-admin-webapps less than 5.0.30-27.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049663" comment="tomcat5-webapps less than 5.0.30-27.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049664" comment="tomcat5 less than 5.0.30-27.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3272</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3272" source="CVE"/>
	<description>
	The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3276f37f75cc08a5c448154a6a6c031c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 5e8c429ac407ead6820878090901b73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 5f023b1674833357edde4fe75478d5b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048010" comment="kernel-xen less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048011" comment="kernel-xenpae less than 2.6.16.60-0.29"/>
		</criteria>
	</criteria>
	<!-- 718b6702959f49befc427f8e908e1ce1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048029" comment="kernel-debug less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048030" comment="kernel-kdump less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048028" comment="kernel-xen less than 2.6.16.60-0.30"/>
		</criteria>
	</criteria>
	<!-- 8f81a57487eb7e634b38c9359fc25d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047591" comment="kernel-rt less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047592" comment="kernel-rt_bigsmp less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047593" comment="kernel-rt_debug less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047594" comment="kernel-rt_timing less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047595" comment="kernel-source less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047596" comment="kernel-syms less than 2.6.22.19-0.18"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3275</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3275" source="CVE"/>
	<description>
	The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3276f37f75cc08a5c448154a6a6c031c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 5e8c429ac407ead6820878090901b73b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
	</criteria>
	<!-- 5f023b1674833357edde4fe75478d5b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048007" comment="kernel-debug less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048003" comment="kernel-kdump less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048010" comment="kernel-xen less than 2.6.16.60-0.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048011" comment="kernel-xenpae less than 2.6.16.60-0.29"/>
		</criteria>
	</criteria>
	<!-- 718b6702959f49befc427f8e908e1ce1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048029" comment="kernel-debug less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048030" comment="kernel-kdump less than 2.6.16.60-0.30"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048028" comment="kernel-xen less than 2.6.16.60-0.30"/>
		</criteria>
	</criteria>
	<!-- 8f81a57487eb7e634b38c9359fc25d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047591" comment="kernel-rt less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047592" comment="kernel-rt_bigsmp less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047593" comment="kernel-rt_debug less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047594" comment="kernel-rt_timing less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047595" comment="kernel-source less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047596" comment="kernel-syms less than 2.6.22.19-0.18"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3276</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3276" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3276" source="CVE"/>
	<description>
	Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field.
	</description>
 </metadata>
<!-- 8f81a57487eb7e634b38c9359fc25d4a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047591" comment="kernel-rt less than 2.6.22.19-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047592" comment="kernel-rt_bigsmp less than 2.6.22.19-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047593" comment="kernel-rt_debug less than 2.6.22.19-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047594" comment="kernel-rt_timing less than 2.6.22.19-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047595" comment="kernel-source less than 2.6.22.19-0.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047596" comment="kernel-syms less than 2.6.22.19-0.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3422</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3422" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the ASP.net class libraries in Mono 2.0 and earlier allow remote attackers to inject arbitrary web script or HTML via crafted attributes related to (1) HtmlControl.cs (PreProcessRelativeReference), (2) HtmlForm.cs (RenderAttributes), (3) HtmlInputButton (RenderAttributes), (4) HtmlInputRadioButton (RenderAttributes), and (5) HtmlSelect (RenderChildren).
	</description>
 </metadata>
<!-- 883e421466c8d7ef4f7d46c54bd8ed9e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049869" comment="bytefx-data-mysql less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049870" comment="ibm-data-db2 less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049871" comment="mono-basic less than 1.2.2-13.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049872" comment="mono-core-32bit less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049888" comment="mono-core-x86 less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049873" comment="mono-core less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049874" comment="mono-data-firebird less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049875" comment="mono-data-oracle less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049876" comment="mono-data-postgresql less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049877" comment="mono-data-sqlite less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049878" comment="mono-data-sybase less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049879" comment="mono-data less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049880" comment="mono-devel less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049881" comment="mono-extras less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049889" comment="mono-jscript less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049882" comment="mono-locale-extras less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049883" comment="mono-nunit less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049884" comment="mono-web less than 1.2.2-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049885" comment="mono-winforms less than 1.2.2-12.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3443</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3443" source="CVE"/>
	<description>
	The regular expression engine (regex.c) in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows remote attackers to cause a denial of service (infinite loop and crash) via multiple long requests to a Ruby socket, related to memory allocation failure, and as demonstrated against Webrick.
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3520</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3520" source="CVE"/>
	<description>
	Multiple integer overflows in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via a crafted image file, related to integer multiplication for memory allocation.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049914" comment="jasper less than 1.701.0-16.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3521</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3521" source="CVE"/>
	<description>
	Race condition in the jas_stream_tmpfile function in libjasper/base/jas_stream.c in JasPer 1.900.1 allows local users to cause a denial of service (program exit) by creating the appropriate tmp.XXXXXXXXXX temporary file, which causes Jasper to exit.  NOTE: this was originally reported as a symlink issue, but this was incorrect.  NOTE: some vendors dispute the severity of this issue, but it satisfies CVE's requirements for inclusion.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049914" comment="jasper less than 1.701.0-16.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3522</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3522" source="CVE"/>
	<description>
	Buffer overflow in the jas_stream_printf function in libjasper/base/jas_stream.c in JasPer 1.900.1 might allow context-dependent attackers to have an unknown impact via vectors related to the mif_hdr_put function and use of vsprintf.
	</description>
 </metadata>
<!-- 8b7969b972f487746cbdfd26efd3ae0a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049914" comment="jasper less than 1.701.0-16.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3525</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3525" source="CVE"/>
	<description>
	The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows local users to bypass intended capability restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 112e2d60fade685e1d5878ae21ce2bc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
	</criteria>
	<!-- 1f60f6114b5878d38c45087bbe9d5f99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047573" comment="kernel-xenpae less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 51097d5d388421c6b5752d422c0c672a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 8f81a57487eb7e634b38c9359fc25d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047591" comment="kernel-rt less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047592" comment="kernel-rt_bigsmp less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047593" comment="kernel-rt_debug less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047594" comment="kernel-rt_timing less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047595" comment="kernel-source less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047596" comment="kernel-syms less than 2.6.22.19-0.18"/>
		</criteria>
	</criteria>
	<!-- f8a0975219658ddcd214ea7538810b92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3528</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3528" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528" source="CVE"/>
	<description>
	The error-reporting functionality in (1) fs/ext2/dir.c, (2) fs/ext3/dir.c, and possibly (3) fs/ext4/dir.c in the Linux kernel 2.6.26.5 does not limit the number of printk console messages that report directory corruption, which allows physically proximate attackers to cause a denial of service (temporary system hang) by mounting a filesystem that has corrupted dir-&gt;i_size and dir-&gt;i_blocks values and performing (a) read or (b) write operations.  NOTE: there are limited scenarios in which this crosses privilege boundaries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 112e2d60fade685e1d5878ae21ce2bc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
	</criteria>
	<!-- 1f60f6114b5878d38c45087bbe9d5f99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047573" comment="kernel-xenpae less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 51097d5d388421c6b5752d422c0c672a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 8f81a57487eb7e634b38c9359fc25d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047591" comment="kernel-rt less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047592" comment="kernel-rt_bigsmp less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047593" comment="kernel-rt_debug less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047594" comment="kernel-rt_timing less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047595" comment="kernel-source less than 2.6.22.19-0.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047596" comment="kernel-syms less than 2.6.22.19-0.18"/>
		</criteria>
	</criteria>
	<!-- f8a0975219658ddcd214ea7538810b92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3532</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3532" source="CVE"/>
	<description>
	The NSS plugin in libpurple in Pidgin 2.4.3 does not verify SSL certificates, which makes it easier for remote attackers to trick a user into accepting an invalid server certificate for a spoofed service.
	</description>
 </metadata>
<!-- 3958fddec2f2300979834d9248cbb5ee -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049462" comment="finch-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049459" comment="finch less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049463" comment="libpurple-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049460" comment="libpurple less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049464" comment="pidgin-devel less than 2.3.1-10.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049461" comment="pidgin less than 2.3.1-10.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3651</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3651" source="CVE"/>
	<description>
	Memory leak in racoon/proposal.c in the racoon daemon in ipsec-tools before 0.7.1 allows remote authenticated users to cause a denial of service (memory consumption) via invalid proposals.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 002debd7fd5575e0f83a48921e02a556 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050003" comment="ipsec-tools less than 0.6.5-10.10"/>
	</criteria>
	<!-- f347b45d421898d9ec14e07173bf5cc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050009" comment="novell-ipsec-tools-devel less than 0.6.3-26.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050008" comment="novell-ipsec-tools less than 0.6.3-26.23"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3652</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3652" source="CVE"/>
	<description>
	src/racoon/handler.c in racoon in ipsec-tools does not remove an "orphaned ph1" (phase 1) handle when it has been initiated remotely, which allows remote attackers to cause a denial of service (resource consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 002debd7fd5575e0f83a48921e02a556 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050003" comment="ipsec-tools less than 0.6.5-10.10"/>
	</criteria>
	<!-- f347b45d421898d9ec14e07173bf5cc7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050009" comment="novell-ipsec-tools-devel less than 0.6.3-26.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050008" comment="novell-ipsec-tools less than 0.6.3-26.23"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3655</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3655" source="CVE"/>
	<description>
	Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not properly restrict access to critical variables and methods at various safe levels, which allows context-dependent attackers to bypass intended access restrictions via (1) untrace_var, (2) $PROGRAM_NAME, and (3) syslog at safe level 4, and (4) insecure methods at safe levels 1 through 3.
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3656</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3656" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the WEBrick::HTTPUtils.split_header_value function in WEBrick::HTTP::DefaultFileHandler in WEBrick in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted HTTP request that is processed by a backtracking regular expression.
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3657</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3657" source="CVE"/>
	<description>
	The dl module in Ruby 1.8.5 and earlier, 1.8.6 through 1.8.6-p286, 1.8.7 through 1.8.7-p71, and 1.9 through r18423 does not check "taintness" of inputs, which allows context-dependent attackers to bypass safe levels and execute dangerous functions by accessing a library using DL.dlopen.
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3658</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3658" source="CVE"/>
	<description>
	Buffer overflow in the imageloadfont function in ext/gd/gd.c in PHP 4.4.x before 4.4.9 and PHP 5.2 before 5.2.6-r6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 0e18dd3a2d160b5f11f9601aee7acf74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050010" comment="apache2-mod_php5 less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050011" comment="php5-bcmath less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050012" comment="php5-bz2 less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050013" comment="php5-calendar less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050014" comment="php5-ctype less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050015" comment="php5-curl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050016" comment="php5-dba less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050017" comment="php5-dbase less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050018" comment="php5-devel less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050019" comment="php5-dom less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050020" comment="php5-exif less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050021" comment="php5-fastcgi less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050022" comment="php5-ftp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050023" comment="php5-gd less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050024" comment="php5-gettext less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050025" comment="php5-gmp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050026" comment="php5-iconv less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050027" comment="php5-imap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050029" comment="php5-ldap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050030" comment="php5-mbstring less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050031" comment="php5-mcrypt less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050032" comment="php5-mhash less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050033" comment="php5-mysql less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050034" comment="php5-ncurses less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050035" comment="php5-odbc less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050036" comment="php5-openssl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050037" comment="php5-pcntl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050038" comment="php5-pdo less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050039" comment="php5-pear less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050040" comment="php5-pgsql less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050041" comment="php5-posix less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050042" comment="php5-pspell less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050043" comment="php5-shmop less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050044" comment="php5-snmp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050045" comment="php5-soap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050046" comment="php5-sockets less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050047" comment="php5-sqlite less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050048" comment="php5-suhosin less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050049" comment="php5-sysvmsg less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050050" comment="php5-sysvsem less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050051" comment="php5-sysvshm less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050058" comment="php5-tidy less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050052" comment="php5-tokenizer less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050053" comment="php5-wddx less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050054" comment="php5-xmlreader less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050055" comment="php5-xmlrpc less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050056" comment="php5-xsl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050057" comment="php5-zlib less than 5.2.5-9.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3659</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3659" source="CVE"/>
	<description>
	Buffer overflow in the memnstr function in PHP 4.4.x before 4.4.9 and PHP 5.6 through 5.2.6 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via the delimiter argument to the explode function.  NOTE: the scope of this issue is limited since most applications would not use an attacker-controlled delimiter, but local attacks against safe_mode are feasible.
	</description>
 </metadata>
<!-- 0e18dd3a2d160b5f11f9601aee7acf74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050010" comment="apache2-mod_php5 less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050011" comment="php5-bcmath less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050012" comment="php5-bz2 less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050013" comment="php5-calendar less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050014" comment="php5-ctype less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050015" comment="php5-curl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050016" comment="php5-dba less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050017" comment="php5-dbase less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050018" comment="php5-devel less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050019" comment="php5-dom less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050020" comment="php5-exif less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050021" comment="php5-fastcgi less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050022" comment="php5-ftp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050023" comment="php5-gd less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050024" comment="php5-gettext less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050025" comment="php5-gmp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050026" comment="php5-iconv less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050027" comment="php5-imap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050029" comment="php5-ldap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050030" comment="php5-mbstring less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050031" comment="php5-mcrypt less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050032" comment="php5-mhash less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050033" comment="php5-mysql less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050034" comment="php5-ncurses less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050035" comment="php5-odbc less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050036" comment="php5-openssl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050037" comment="php5-pcntl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050038" comment="php5-pdo less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050039" comment="php5-pear less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050040" comment="php5-pgsql less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050041" comment="php5-posix less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050042" comment="php5-pspell less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050043" comment="php5-shmop less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050044" comment="php5-snmp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050045" comment="php5-soap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050046" comment="php5-sockets less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050047" comment="php5-sqlite less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050048" comment="php5-suhosin less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050049" comment="php5-sysvmsg less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050050" comment="php5-sysvsem less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050051" comment="php5-sysvshm less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050058" comment="php5-tidy less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050052" comment="php5-tokenizer less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050053" comment="php5-wddx less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050054" comment="php5-xmlreader less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050055" comment="php5-xmlrpc less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050056" comment="php5-xsl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050057" comment="php5-zlib less than 5.2.5-9.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3660</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3660" source="CVE"/>
	<description>
	PHP 4.4.x before 4.4.9, and 5.x through 5.2.6, when used as a FastCGI module, allows remote attackers to cause a denial of service (crash) via a request with multiple dots preceding the extension, as demonstrated using foo..php.
	</description>
 </metadata>
<!-- 0e18dd3a2d160b5f11f9601aee7acf74 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050010" comment="apache2-mod_php5 less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050011" comment="php5-bcmath less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050012" comment="php5-bz2 less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050013" comment="php5-calendar less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050014" comment="php5-ctype less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050015" comment="php5-curl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050016" comment="php5-dba less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050017" comment="php5-dbase less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050018" comment="php5-devel less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050019" comment="php5-dom less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050020" comment="php5-exif less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050021" comment="php5-fastcgi less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050022" comment="php5-ftp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050023" comment="php5-gd less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050024" comment="php5-gettext less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050025" comment="php5-gmp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050026" comment="php5-iconv less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050027" comment="php5-imap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050029" comment="php5-ldap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050030" comment="php5-mbstring less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050031" comment="php5-mcrypt less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050032" comment="php5-mhash less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050033" comment="php5-mysql less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050034" comment="php5-ncurses less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050035" comment="php5-odbc less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050036" comment="php5-openssl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050037" comment="php5-pcntl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050038" comment="php5-pdo less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050039" comment="php5-pear less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050040" comment="php5-pgsql less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050041" comment="php5-posix less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050042" comment="php5-pspell less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050043" comment="php5-shmop less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050044" comment="php5-snmp less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050045" comment="php5-soap less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050046" comment="php5-sockets less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050047" comment="php5-sqlite less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050048" comment="php5-suhosin less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050049" comment="php5-sysvmsg less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050050" comment="php5-sysvsem less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050051" comment="php5-sysvshm less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050058" comment="php5-tidy less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050052" comment="php5-tokenizer less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050053" comment="php5-wddx less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050054" comment="php5-xmlreader less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050055" comment="php5-xmlrpc less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050056" comment="php5-xsl less than 5.2.5-9.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050057" comment="php5-zlib less than 5.2.5-9.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3790</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3790" source="CVE"/>
	<description>
	The REXML module in Ruby 1.8.6 through 1.8.6-p287, 1.8.7 through 1.8.7-p72, and 1.9 allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML document with recursively nested entities, aka an "XML entity explosion."
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3834</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2008-3834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3834" source="CVE"/>
	<description>
	The dbus_signature_validate function in the D-bus library (libdbus) before 1.2.4 allows remote attackers to cause a denial of service (application abort) via a message containing a malformed signature, which triggers a failed assertion error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 41aee927ae21b333f1cae6b1ddc4b738 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050278" comment="dbus-1-devel-doc less than 0.60-33.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050246" comment="dbus-1-devel less than 0.60-33.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050272" comment="dbus-1-java less than 0.60-33.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050256" comment="dbus-1-qt less than 4.3.4-0.3"/>
		</criteria>
	</criteria>
	<!-- c666fe3b8224eb67e03aff3ec8053e7b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068048" comment="dbus-1-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068051" comment="dbus-1-glib-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068052" comment="dbus-1-glib-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068059" comment="dbus-1-qt3-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068061" comment="dbus-1-qt3-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068064" comment="dbus-1-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068066" comment="dbus-1-devel-doc less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
			</criteria>
		</criteria></criteria>
	<!-- dde20c718132c54e40619cef79c34890 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068048" comment="dbus-1-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068051" comment="dbus-1-glib-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068052" comment="dbus-1-glib-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068059" comment="dbus-1-qt3-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068061" comment="dbus-1-qt3-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068064" comment="dbus-1-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068066" comment="dbus-1-devel-doc less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3835</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3835" source="CVE"/>
	<description>
	The nsXMLDocument::OnChannelRedirect function in Mozilla Firefox before 2.0.0.17, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code via unknown vectors.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3836</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3836" source="CVE"/>
	<description>
	feedWriter in Mozilla Firefox before 2.0.0.17 allows remote attackers to execute scripts with chrome privileges via vectors related to feed preview and the (1) elem.doCommand, (2) elem.dispatchEvent, (3) _setTitleText, (4) _setTitleImage, and (5) _initSubscriptionUI functions.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3837</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3837" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, and SeaMonkey before 1.1.12, allow user-assisted remote attackers to move a window during a mouse click, and possibly force a file download or unspecified other drag-and-drop action, via a crafted onmousedown action that calls window.moveBy, a variant of CVE-2003-0823.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3905</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3905" source="CVE"/>
	<description>
	resolv.rb in Ruby 1.8.5 and earlier, 1.8.6 before 1.8.6-p287, 1.8.7 before 1.8.7-p72, and 1.9 r18423 and earlier uses sequential transaction IDs and constant source ports for DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447.
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3912</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3912" source="CVE"/>
	<description>
	libclamav in ClamAV before 0.94 allows attackers to cause a denial of service (NULL pointer dereference and application crash) via vectors related to an out-of-memory condition.
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3913</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3913" source="CVE"/>
	<description>
	Multiple memory leaks in freshclam/manager.c in ClamAV before 0.94 might allow attackers to cause a denial of service (memory consumption) via unspecified vectors related to "error handling logic".
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3914</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3914" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in ClamAV before 0.94 have unknown impact and attack vectors related to file descriptor leaks on the "error path" in (1) libclamav/others.c and (2) libclamav/sis.c.
	</description>
 </metadata>
<!-- 6fe34b1c9d039aec8e5e021d06d7eb6c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033770" comment="clamav less than 0.94-0.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3916</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-3916" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3916" source="CVE"/>
	<description>
	Heap-based buffer overflow in the strip_escapes function in signal.c in GNU ed before 1.0 allows context-dependent or user-assisted attackers to execute arbitrary code via a long filename.  NOTE: since ed itself does not typically run with special privileges, this issue only crosses privilege boundaries when ed is invoked as a third-party component.
	</description>
 </metadata>
<!-- 69a1938158b1d690f7f2fe691022627b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065536" comment="ed less than 0.2-881.9.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3933</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3933" source="CVE"/>
	<description>
	Wireshark (formerly Ethereal) 0.10.14 through 1.0.2 allows attackers to cause a denial of service (crash) via a packet with crafted zlib-compressed data that triggers an invalid read in the tvb_uncompress function.
	</description>
 </metadata>
<!-- 44b4ca263adb75d85c67a607ca216579 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050311" comment="ethereal-devel less than 0.10.14-16.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3963</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3963" source="CVE"/>
	<description>
	MySQL 5.0 before 5.0.66, 5.1 before 5.1.26, and 6.0 before 6.0.6 does not properly handle a b'' (b single-quote single-quote) token, aka an empty bit-string literal, which allows remote attackers to cause a denial of service (daemon crash) by using this token in a SQL statement.
	</description>
 </metadata>
<!-- 86ac097c759d8810264f9a1ba90eafc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050335" comment="mysql-Max less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050338" comment="mysql-bench less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050326" comment="mysql-client less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050327" comment="mysql-devel less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050328" comment="mysql-shared-32bit less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050336" comment="mysql-shared-64bit less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050337" comment="mysql-shared-x86 less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050329" comment="mysql-shared less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050330" comment="mysql less than 5.0.26-12.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20083972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-3972</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3972" source="CVE"/>
	<description>
	pkcs15-tool in OpenSC before 0.11.6 does not apply security updates to a smart card unless the card's label matches the "OpenSC" string, which might allow physically proximate attackers to exploit vulnerabilities that the card owner expected were patched, as demonstrated by exploitation of CVE-2008-2235.
	</description>
 </metadata>
<!-- c3fd31aad32a3c9d1c57dd1c890137ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049060" comment="opensc-32bit less than 0.9.6-17.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049063" comment="opensc-devel less than 0.9.6-17.9"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4058</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4058" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to (1) chrome XBL and (2) chrome JS.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4059</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4059" source="CVE"/>
	<description>
	The XPConnect component in Mozilla Firefox before 2.0.0.17 allows remote attackers to "pollute XPCNativeWrappers" and execute arbitrary code with chrome privileges via vectors related to a SCRIPT element.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4060</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4060" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to create documents that lack script-handling objects, and execute arbitrary code with chrome privileges, via vectors related to (1) the document.loadBindingDocument function and (2) XSLT.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4061</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4061" source="CVE"/>
	<description>
	Integer overflow in the MathML component in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via an mtd element with a large integer value in the rowspan attribute, related to the layout engine.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4062</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4062" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the JavaScript engine and (1) misinterpretation of the characteristics of Namespace and QName in jsxml.c, (2) misuse of signed integers in the nsEscapeCount function in nsEscape.cpp, and (3) interaction of JavaScript garbage collection with certain use of an NPObject in the nsNPObjWrapper::GetNewOrUsed function in nsJSNPRuntime.cpp.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4063</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4063" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the layout engine and (1) a zero value of the "this" variable in the nsContentList::Item function; (2) interaction of the indic IME extension, a Hindi language selection, and the "g" character; and (3) interaction of the nsFrameList::SortByContentOrder function with a certain insufficient protection of inline frames.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4064</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4064" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4064" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to graphics rendering and (1) handling of a long alert messagebox in the cairo_surface_set_device_offset function, (2) integer overflows when handling animated PNG data in the info_callback function in nsPNGDecoder.cpp, and (3) an integer overflow when handling SVG data in the nsSVGFEGaussianBlurElement::SetupPredivide function in nsSVGFilters.cpp.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4065</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4065" source="CVE"/>
	<description>
	Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allow remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via byte order mark (BOM) characters that are removed from JavaScript code before execution, aka "Stripped BOM characters bug."
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4066</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4066" source="CVE"/>
	<description>
	Mozilla Firefox 2.0.0.14, and other versions before 2.0.0.17, allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms and conduct XSS attacks via HTML-escaped low surrogate characters that are ignored by the HTML parser, as demonstrated by a "jav&amp;#56325ascript" sequence, aka "HTML escaped low surrogates bug."
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4067</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4067" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 on Linux allows remote attackers to read arbitrary files via a .. (dot dot) and URL-encoded / (slash) characters in a resource: URI.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4068</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4068" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 2.0.0.17 and 3.x before 3.0.2, Thunderbird before 2.0.0.17, and SeaMonkey before 1.1.12 allows remote attackers to bypass "restrictions imposed on local HTML files," and obtain sensitive information and prompt users to write this information into a file, via directory traversal sequences in a resource: URI.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4069</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4069" source="CVE"/>
	<description>
	The XBM decoder in Mozilla Firefox before 2.0.0.17 and SeaMonkey before 1.1.12 allows remote attackers to read uninitialized memory, and possibly obtain sensitive information in opportunistic circumstances, via a crafted XBM image file.
	</description>
 </metadata>
<!-- 7cd7dff5951cf6310603096b81b16922 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047646" comment="gecko-sdk less than 1.8.0.14eol-0.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4094</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4094" source="CVE"/>
	<description>
	Multiple SQL injection vulnerabilities in Ruby on Rails before 2.1.1 allow remote attackers to execute arbitrary SQL commands via the (1) :limit and (2) :offset parameters, related to ActiveRecord, ActiveSupport, ActiveResource, ActionPack, and ActionMailer.
	</description>
 </metadata>
<!-- a2c57565eb238be929da2314fa9cd2fa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050368" comment="rubygem-activerecord-1_14 less than 1.14.4-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050369" comment="rubygem-activerecord-2_0 less than 2.0.2-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050370" comment="rubygem-activerecord less than 2.0.2-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4097</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4097" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4097" source="CVE"/>
	<description>
	MySQL 5.0.51a allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are associated with symlinks within pathnames for subdirectories of the MySQL home data directory, which are followed when tables are created in the future. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-2079.
	</description>
 </metadata>
<!-- 86ac097c759d8810264f9a1ba90eafc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050335" comment="mysql-Max less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050338" comment="mysql-bench less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050326" comment="mysql-client less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050327" comment="mysql-devel less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050328" comment="mysql-shared-32bit less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050336" comment="mysql-shared-64bit less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050337" comment="mysql-shared-x86 less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050329" comment="mysql-shared less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050330" comment="mysql less than 5.0.26-12.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4098</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4098" source="CVE"/>
	<description>
	MySQL before 5.0.67 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL home data directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4097.
	</description>
 </metadata>
<!-- 86ac097c759d8810264f9a1ba90eafc7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050335" comment="mysql-Max less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050338" comment="mysql-bench less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050326" comment="mysql-client less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050327" comment="mysql-devel less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050328" comment="mysql-shared-32bit less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050336" comment="mysql-shared-64bit less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050337" comment="mysql-shared-x86 less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050329" comment="mysql-shared less than 5.0.26-12.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050330" comment="mysql less than 5.0.26-12.22"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4101</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4101" source="CVE"/>
	<description>
	Vim 3.0 through 7.x before 7.2.010 does not properly escape characters, which allows user-assisted attackers to (1) execute arbitrary shell commands by entering a K keystroke on a line that contains a ";" (semicolon) followed by a command, or execute arbitrary Ex commands by entering an argument after a (2) "Ctrl-]" (control close-square-bracket) or (3) "g]" (g close-square-bracket) keystroke sequence, a different issue than CVE-2008-2712.
	</description>
 </metadata>
<!-- a602d638015fb430b52467b3602420eb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049363" comment="gvim less than 6.4.6-19.15"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4210</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4210" source="CVE"/>
	<description>
	fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by creating an executable file in a setgid directory through the (1) truncate or (2) ftruncate function in conjunction with memory-mapped I/O.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 112e2d60fade685e1d5878ae21ce2bc0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
	</criteria>
	<!-- 1f60f6114b5878d38c45087bbe9d5f99 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047573" comment="kernel-xenpae less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- 51097d5d388421c6b5752d422c0c672a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047566" comment="kernel-kdump less than 2.6.16.60-0.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047572" comment="kernel-xen less than 2.6.16.60-0.31"/>
		</criteria>
	</criteria>
	<!-- f8a0975219658ddcd214ea7538810b92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009047574" comment="kernel-debug less than 2.6.16.60-0.31"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4309</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4309" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4309" source="CVE"/>
	<description>
	Integer overflow in the netsnmp_create_subtree_cache function in agent/snmp_agent.c in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via a crafted SNMP GETBULK request, which triggers a heap-based buffer overflow,  related to the number of responses or repeats.
	</description>
 </metadata>
<!-- f4e6b8f24e3d9cd9eb899f7cb6c221cf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050452" comment="net-snmp-devel-64bit less than 5.3.0.1-25.28"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050445" comment="net-snmp-devel less than 5.3.0.1-25.28"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4311</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4311" source="CVE"/>
	<description>
	The default configuration of system.conf in D-Bus (aka DBus) before 1.2.6 omits the send_type attribute in certain rules, which allows local users to bypass intended access restrictions by (1) sending messages, related to send_requested_reply; and possibly (2) receiving messages, related to receive_requested_reply.
	</description>
 </metadata>
<!-- 311751acc19cbddee5636553f5b9da99 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050492" comment="dbus-1-devel-doc less than 0.60-33.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050474" comment="dbus-1-devel less than 0.60-33.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050488" comment="dbus-1-java less than 0.60-33.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4314</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4314" source="CVE"/>
	<description>
	smbd in Samba 3.0.29 through 3.2.4 might allow remote attackers to read arbitrary memory and cause a denial of service via crafted (1) trans, (2) trans2, and (3) nttrans requests, related to a "cut&amp;paste error" that causes an improper bounds check to be performed.
	</description>
 </metadata>
<!-- f2065c05a9f3b96c640ae23d6ae0d05f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050734" comment="libmsrpc-devel less than 3.0.32-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050735" comment="libmsrpc less than 3.0.32-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050711" comment="libsmbclient-devel less than 3.0.32-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050745" comment="libsmbsharemodes-devel less than 3.0.32-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050746" comment="libsmbsharemodes less than 3.0.32-0.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050741" comment="samba-python less than 3.0.32-0.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4395</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4395" source="CVE"/>
	<description>
	Multiple buffer overflows in the ndiswrapper module 1.53 for the Linux kernel 2.6 allow remote attackers to execute arbitrary code by sending packets over a local wireless network that specify long ESSIDs.
	</description>
 </metadata>
<!-- 31ae27aceb17a8cc7f45d79bdee926b7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050794" comment="ndiswrapper-kmp-bigsmp less than 1.34_2.6.16.60_0.33-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050795" comment="ndiswrapper-kmp-default less than 1.34_2.6.16.60_0.33-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050796" comment="ndiswrapper-kmp-smp less than 1.34_2.6.16.60_0.33-1.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050797" comment="ndiswrapper less than 1.34-1.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4456</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4456" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the command-line client in MySQL 5.0.26 through 5.0.45, and other versions including versions later than 5.0.45, when the --html option is enabled, allows attackers to inject arbitrary web script or HTML by placing it in a database cell, which might be accessed by this client when composing an HTML document.  NOTE: as of 20081031, the issue has not been fixed in MySQL 5.0.67.
	</description>
 </metadata>
<!-- cf52306cd57814ae2f1723f7a7eb2362 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054355" comment="mysql-Max less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054358" comment="mysql-bench less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054350" comment="mysql-client less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054351" comment="mysql-devel less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054352" comment="mysql-shared-32bit less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054356" comment="mysql-shared-64bit less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054357" comment="mysql-shared-x86 less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054353" comment="mysql-shared less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054354" comment="mysql less than 5.0.26-12.24.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4539</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4539" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Cirrus VGA implementation in (1) KVM before kvm-82 and (2) QEMU on Debian GNU/Linux and Ubuntu might allow local users to gain privileges by using the VNC console for a connection, aka the LGD-54XX "bitblt" heap overflow.  NOTE: this issue exists because of an incorrect fix for CVE-2007-1320.
	</description>
 </metadata>
<!-- 816577e14f3b7b0abdb6d607f482c9a8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009048155" comment="qemu less than 0.8.2-37.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4554</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4554" source="CVE"/>
	<description>
	The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.
	</description>
 </metadata>
<!-- 9e461dcf8400c191f47c72c26b2f2ea4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050816" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050817" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050818" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050819" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050820" comment="kernel-rt less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050821" comment="kernel-rt_bigsmp less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050822" comment="kernel-rt_debug less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050823" comment="kernel-rt_timing less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050824" comment="kernel-source less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050825" comment="kernel-syms less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050826" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050827" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050828" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050829" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050830" comment="ofed-doc less than 1.3-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050831" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050832" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050833" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050834" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050835" comment="ofed less than 1.3-0.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4555" source="CVE"/>
	<description>
	Stack-based buffer overflow in the push_subg function in parser.y (lib/graph/parser.c) in Graphviz 2.20.2, and possibly earlier versions, allows user-assisted remote attackers to cause a denial of service (memory corruption) or execute arbitrary code via a DOT file with a large number of Agraph_t elements.
	</description>
 </metadata>
<!-- 49e0966f4b4de66f0322a4527d9a6d7f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050855" comment="graphviz-devel less than 2.6-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050856" comment="graphviz-tcl less than 2.6-22.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050854" comment="graphviz less than 2.6-22.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4576</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4576" source="CVE"/>
	<description>
	sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.
	</description>
 </metadata>
<!-- 4d8d80f7cb0fef16902d102b7aedfe96 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050859" comment="dapl-32bit less than 1.2.7-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050860" comment="dapl-devel-32bit less than 1.2.7-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050861" comment="dapl-devel less than 1.2.7-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050862" comment="dapl2-32bit less than 2.0.9-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050863" comment="dapl2-devel-32bit less than 2.0.9-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050864" comment="dapl2-devel less than 2.0.9-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050865" comment="dapl2 less than 2.0.9-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050866" comment="dapl less than 1.2.7-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050867" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.19-1.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050868" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.19-1.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050869" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.19-1.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050870" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.19-1.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050871" comment="ib-bonding less than 0.9.0-1.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050872" comment="ibutils-32bit less than 1.2-1.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050873" comment="ibutils less than 1.2-1.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050874" comment="ibvexdmtools less than 0.0.1-1.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050875" comment="infiniband-diags less than 1.3.6-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050876" comment="kernel-rt less than 2.6.22.19-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050877" comment="kernel-rt_bigsmp less than 2.6.22.19-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050878" comment="kernel-rt_debug less than 2.6.22.19-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050879" comment="kernel-rt_timing less than 2.6.22.19-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050880" comment="kernel-source less than 2.6.22.19-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050881" comment="kernel-syms less than 2.6.22.19-0.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050882" comment="libcxgb3-32bit less than 1.2.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050883" comment="libcxgb3-devel-32bit less than 1.2.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050884" comment="libcxgb3-devel less than 1.2.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050885" comment="libcxgb3 less than 1.2.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050886" comment="librdmacm-32bit less than 1.0.7-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050887" comment="librdmacm-devel-32bit less than 1.0.7-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050888" comment="librdmacm-devel less than 1.0.7-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050889" comment="librdmacm less than 1.0.7-31.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050890" comment="mpi-selector less than 1.0.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050891" comment="mpitests-mvapich2 less than 3.0-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050892" comment="mpitests-mvapich less than 3.0-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050893" comment="mpitests-openmpi less than 3.0-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050894" comment="mpitests less than 3.0-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050895" comment="mstflint less than 1.3-0.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050896" comment="mvapich-devel less than 1.0.1_2533-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050897" comment="mvapich2-32bit less than 1.0.3-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050898" comment="mvapich2-devel less than 1.0.3-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050899" comment="mvapich2 less than 1.0.3-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050900" comment="mvapich less than 1.0.1_2533-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050901" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050902" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050903" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050904" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.19-0.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050905" comment="ofed-doc less than 1.3-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050906" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.19-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050907" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.19-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050908" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.19-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050909" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.19-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050910" comment="ofed less than 1.3-0.30"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050911" comment="openmpi-32bit less than 1.2.6-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050912" comment="openmpi-devel-32bit less than 1.2.6-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050913" comment="openmpi-devel less than 1.2.6-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050914" comment="openmpi less than 1.2.6-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050915" comment="opensm-32bit less than 3.1.11-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050916" comment="opensm-devel-32bit less than 3.1.11-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050917" comment="opensm-devel less than 3.1.11-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050918" comment="opensm less than 3.1.11-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050919" comment="perftest less than 1.2-1.9"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050920" comment="qlvnictools less than 0.0.1-1.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4680</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4680" source="CVE"/>
	<description>
	packet-usb.c in the USB dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a malformed USB Request Block (URB).
	</description>
 </metadata>
<!-- 44b4ca263adb75d85c67a607ca216579 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050311" comment="ethereal-devel less than 0.10.14-16.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4681</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4681" source="CVE"/>
	<description>
	Unspecified vulnerability in the Bluetooth RFCOMM dissector in Wireshark 0.99.7 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via unknown packets.
	</description>
 </metadata>
<!-- 44b4ca263adb75d85c67a607ca216579 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050311" comment="ethereal-devel less than 0.10.14-16.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4683</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4683" source="CVE"/>
	<description>
	The dissect_btacl function in packet-bthci_acl.c in the Bluetooth ACL dissector in Wireshark 0.99.2 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via a packet with an invalid length, related to an erroneous tvb_memcpy call.
	</description>
 </metadata>
<!-- 44b4ca263adb75d85c67a607ca216579 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050311" comment="ethereal-devel less than 0.10.14-16.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4685</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4685" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dissect_q931_cause_ie function in packet-q931.c in the Q.931 dissector in Wireshark 0.10.3 through 1.0.3 allows remote attackers to cause a denial of service (application crash or abort) via certain packets that trigger an exception.
	</description>
 </metadata>
<!-- 44b4ca263adb75d85c67a607ca216579 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050311" comment="ethereal-devel less than 0.10.14-16.31"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4690</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4690" source="CVE"/>
	<description>
	lynx 2.8.6dev.15 and earlier, when advanced mode is enabled and lynx is configured as a URL handler, allows remote attackers to execute arbitrary commands via a crafted lynxcgi: URL, a related issue to CVE-2005-2929.  NOTE: this might only be a vulnerability in limited deployments that have defined a lynxcgi: handler.
	</description>
 </metadata>
<!-- 5411df1b613a6a69bdfd1a60aa1f2dcb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009043038" comment="lynx less than 2.8.5-51.6"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4776</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-4776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776" source="CVE"/>
	<description>
	libgadu before 1.8.2 allows remote servers to cause a denial of service (crash) via a contact description with a large length, which triggers a buffer over-read.
	</description>
 </metadata>
<!-- 61a3b641a9c4e4c8f62b44bd9c2160a0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065304" comment="kdenetwork3-IRC less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065300" comment="kdenetwork3-InstantMessenger less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065305" comment="kdenetwork3-dialup less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065306" comment="kdenetwork3-lan less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065307" comment="kdenetwork3-lisa less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065301" comment="kdenetwork3-news less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065308" comment="kdenetwork3-query less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065302" comment="kdenetwork3-vnc less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065309" comment="kdenetwork3-wireless less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065303" comment="kdenetwork3 less than 3.5.1-32.34.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065304" comment="kdenetwork3-IRC less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065305" comment="kdenetwork3-dialup less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065306" comment="kdenetwork3-lan less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065307" comment="kdenetwork3-lisa less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065308" comment="kdenetwork3-query less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065309" comment="kdenetwork3-wireless less than 3.5.1-32.34.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4864</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4864" source="CVE"/>
	<description>
	Multiple integer overflows in imageop.c in the imageop module in Python 1.5.2 through 2.5.1 allow context-dependent attackers to break out of the Python VM and execute arbitrary code via large integer values in certain arguments to the crop function, leading to a buffer overflow, a different vulnerability than CVE-2007-4965 and CVE-2008-1679.
	</description>
 </metadata>
<!-- aa951e7357be1af77338130db6a11596 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050947" comment="python-demo less than 2.4.2-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050941" comment="python-devel less than 2.4.2-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050948" comment="python-idle less than 2.4.2-18.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4865</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4865" source="CVE"/>
	<description>
	Untrusted search path vulnerability in valgrind before 3.4.0 allows local users to execute arbitrary programs via a Trojan horse .valgrindrc file in the current working directory, as demonstrated using a malicious --db-command options.  NOTE: the severity of this issue has been disputed, but CVE is including this issue because execution of a program from an untrusted directory is a common scenario.
	</description>
 </metadata>
<!-- b6961722775be56c052c2034a6391f8c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050950" comment="valgrind less than 3.3.0-15.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20084933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-4933</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-4933" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4933" source="CVE"/>
	<description>
	Buffer overflow in the hfsplus_find_cat function in fs/hfsplus/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfsplus filesystem image with an invalid catalog namelength field, related to the hfsplus_cat_build_key_uni function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14d206b16e1f6db4bc74003f9d937ed2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050960" comment="kernel-xenpae less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- 315c54bd455583ce56f6bcbe19c768f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
	</criteria>
	<!-- a12607704b9e51847bb7b81ca6d58c3b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- a91d4196357d841dd0ee16be55b3c171 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5012</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5012" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly change the source URI when processing a canvas element and an HTTP redirect, which allows remote attackers to bypass the same origin policy and access arbitrary images that are not directly accessible to the attacker.  NOTE: this issue can be leveraged to enumerate software on the client by performing redirections related to moz-icon.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5013</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5013" source="CVE"/>
	<description>
	Mozilla Firefox 2.x before 2.0.0.18 and SeaMonkey 1.x before 1.1.13 do not properly check when the Flash module has been dynamically unloaded properly, which allows remote attackers to execute arbitrary code via a crafted SWF file that "dynamically unloads itself from an outside JavaScript function," which triggers an access of an expired memory address.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5014</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5014" source="CVE"/>
	<description>
	jslock.cpp in Mozilla Firefox 3.x before 3.0.2, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying the window.__proto__.__proto__ object in a way that causes a lock on a non-native object, which triggers an assertion failure related to the OBJ_IS_NATIVE function.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5016</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5016" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.4, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via multiple vectors that trigger an assertion failure or other consequences.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5017</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5017" source="CVE"/>
	<description>
	Integer overflow in xpcom/io/nsEscape.cpp in the browser engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5018</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5018" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via vectors related to "insufficient class checking" in the Date class.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5021" source="CVE"/>
	<description>
	nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5022</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5022" source="CVE"/>
	<description>
	The nsXMLHttpRequest::NotifyEventListeners method in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the same-origin policy and execute arbitrary script via multiple listeners, which bypass the inner window check.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5023</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5023" source="CVE"/>
	<description>
	Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to bypass the protection mechanism for codebase principals and execute arbitrary script via the -moz-binding CSS property in a signed JAR file.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5024</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5024" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5024" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 do not properly escape quote characters used for XML processing, which allows remote attackers to conduct XML injection attacks via the default namespace in an E4X document.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5025</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5025" source="CVE"/>
	<description>
	Stack-based buffer overflow in the hfs_cat_find_brec function in fs/hfs/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfs filesystem image with an invalid catalog namelength field, a related issue to CVE-2008-4933.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14d206b16e1f6db4bc74003f9d937ed2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050960" comment="kernel-xenpae less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- 315c54bd455583ce56f6bcbe19c768f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
	</criteria>
	<!-- a12607704b9e51847bb7b81ca6d58c3b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- a91d4196357d841dd0ee16be55b3c171 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5029</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5029" source="CVE"/>
	<description>
	The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14d206b16e1f6db4bc74003f9d937ed2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050960" comment="kernel-xenpae less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- 315c54bd455583ce56f6bcbe19c768f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
	</criteria>
	<!-- a12607704b9e51847bb7b81ca6d58c3b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- a91d4196357d841dd0ee16be55b3c171 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5031</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5031" source="CVE"/>
	<description>
	Multiple integer overflows in Python 2.2.3 through 2.5.1, and 2.6, allow context-dependent attackers to have an unknown impact via a large integer value in the tabsize argument to the expandtabs method, as implemented by (1) the string_expandtabs function in Objects/stringobject.c and (2) the unicode_expandtabs function in Objects/unicodeobject.c.  NOTE: this vulnerability reportedly exists because of an incomplete fix for CVE-2008-2315.
	</description>
 </metadata>
<!-- aa951e7357be1af77338130db6a11596 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050947" comment="python-demo less than 2.4.2-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050941" comment="python-devel less than 2.4.2-18.25"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050948" comment="python-idle less than 2.4.2-18.25"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5050</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5050" source="CVE"/>
	<description>
	Off-by-one error in the get_unicode_name function (libclamav/vba_extract.c) in Clam Anti-Virus (ClamAV) before 0.94.1 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted VBA project file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ec5087a97d33637c56335fa37f396dab -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009033880" comment="clamav less than 0.94.1-2.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5052</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5052" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5052" source="CVE"/>
	<description>
	The AppendAttributeValue function in the JavaScript engine in Mozilla Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger memory corruption, as demonstrated by e4x/extensions/regress-410192.js.
	</description>
 </metadata>
<!-- 16382e044e036ef25857e6d46b6ad8c8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047666" comment="gecko-sdk less than 1.8.0.14eol-0.9"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5077</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2008-5077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077" source="CVE"/>
	<description>
	OpenSSL 0.9.8i and earlier does not properly check the return value from the EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 11f6326cece4b234f5ca1844cb648dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051026" comment="openssl-doc less than 0.9.8a-18.27"/>
	</criteria>
	<!-- 6deef59a2e94ee7d0f87aa2f497078c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
		</criteria>
	</criteria>
	<!-- 78caf50c2261c865e06e92ff68d948da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5079</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5079" source="CVE"/>
	<description>
	net/atm/svc.c in the ATM subsystem in the Linux kernel 2.6.27.8 and earlier allows local users to cause a denial of service (kernel infinite loop) by making two calls to svc_listen for the same socket, and then reading a /proc/net/atm/*vc file, related to corruption of the vcc table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14d206b16e1f6db4bc74003f9d937ed2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050960" comment="kernel-xenpae less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- 315c54bd455583ce56f6bcbe19c768f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
	</criteria>
	<!-- a12607704b9e51847bb7b81ca6d58c3b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- a91d4196357d841dd0ee16be55b3c171 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5081</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5081" source="CVE"/>
	<description>
	The originates_from_local_legacy_unicast_socket function (avahi-core/server.c) in avahi-daemon in Avahi before 0.6.24 allows remote attackers to cause a denial of service (crash) via a crafted mDNS packet with a source port of 0, which triggers an assertion failure.
	</description>
 </metadata>
<!-- ca2295cf850462e635e1d8ee02b02dff -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051130" comment="avahi-devel less than 0.6.5-29.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051128" comment="avahi-glib less than 0.6.5-29.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051129" comment="avahi less than 0.6.5-29.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5086</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5086" source="CVE"/>
	<description>
	Multiple methods in libvirt 0.3.2 through 0.5.1 do not check if a connection is read-only, which allows local users to bypass intended access restrictions and perform administrative actions.
	</description>
 </metadata>
<!-- 9cf6494947651fa9b6fc5d951df6cf7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051133" comment="libvirt-devel less than 0.3.3-18.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051131" comment="libvirt-python less than 0.3.3-18.11"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5182" source="CVE"/>
	<description>
	The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14d206b16e1f6db4bc74003f9d937ed2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050960" comment="kernel-xenpae less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- 315c54bd455583ce56f6bcbe19c768f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
	</criteria>
	<!-- a12607704b9e51847bb7b81ca6d58c3b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050962" comment="kernel-kdump less than 2.6.16.60-0.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050959" comment="kernel-xen less than 2.6.16.60-0.34"/>
		</criteria>
	</criteria>
	<!-- a91d4196357d841dd0ee16be55b3c171 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050961" comment="kernel-debug less than 2.6.16.60-0.34"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5187</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5187" source="CVE"/>
	<description>
	The load function in the XPM loader for imlib2 1.4.2, and possibly other versions, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XPM file that triggers a "pointer arithmetic error" and a heap-based buffer overflow, a different vulnerability than CVE-2008-2426.
	</description>
 </metadata>
<!-- 9826e83075148eefad913fab602cb9c6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051157" comment="imlib2-devel less than 1.2.1-17.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051158" comment="imlib2-loaders less than 1.2.1-17.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051159" comment="imlib2 less than 1.2.1-17.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5189</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5189" source="CVE"/>
	<description>
	CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
	</description>
 </metadata>
<!-- fe6f0b5e91a176c9484eae96b67511d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051171" comment="rubygem-actionpack-1_12 less than 1.12.5-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051172" comment="rubygem-actionpack-2_0 less than 2.0.2-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051173" comment="rubygem-actionpack less than 2.0.2-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5233</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5233" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other versions before 1.1.15, does not check for failure of malloc in circumstances including (1) the mymng_process_header function in demux_mng.c, (2) the open_mod_file function in demux_mod.c, and (3) frame_buffer allocation in the real_parse_audio_specific_data function in demux_real.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5234</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5234" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib 1.1.12, and other versions before 1.1.15, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted metadata atom size processed by the parse_moov_atom function in demux_qt.c and (2) frame reading in the id3v23_interp_frame function in id3.c.  NOTE: as of 20081122, it is possible that vector 1 has not been fixed in 1.1.15.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5235</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5235" source="CVE"/>
	<description>
	Heap-based buffer overflow in the demux_real_send_chunk function in src/demuxers/demux_real.c in xine-lib before 1.1.15 allows remote attackers to execute arbitrary code via a crafted Real Media file. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5236</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5236" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to execute arbitrary code via vectors related to (1) a crafted EBML element length processed by the parse_block_group function in demux_matroska.c; (2) a certain combination of sps, w, and h values processed by the real_parse_audio_specific_data and demux_real_send_chunk functions in demux_real.c; and (3) an unspecified combination of three values processed by the open_ra_file function in demux_realaudio.c.  NOTE: vector 2 reportedly exists because of an incomplete fix in 1.1.15.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5237</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5237" source="CVE"/>
	<description>
	Multiple integer overflows in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via (1) crafted width and height values that are not validated by the mymng_process_header function in demux_mng.c before use in an allocation calculation or (2) crafted current_atom_size and string_size values processed by the parse_reference_atom function in demux_qt.c for an RDRF_ATOM string.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5238</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5238" source="CVE"/>
	<description>
	Integer overflow in the real_parse_mdpr function in demux_real.c in xine-lib 1.1.12, and other versions before 1.1.15, allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted stream_name_size field.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5239</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5239" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not properly handle (a) negative and (b) zero values during unspecified read function calls in input_file.c, input_net.c, input_smb.c, and input_http.c, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via vectors such as (1) a file or (2) an HTTP response, which triggers consequences such as out-of-bounds reads and heap-based buffer overflows.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5240</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5240" source="CVE"/>
	<description>
	xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input value to determine the memory allocation and does not check the result for (1) the MATROSKA_ID_TR_CODECPRIVATE track entry element processed by demux_matroska.c; and (2) PROP_TAG, (3) MDPR_TAG, and (4) CONT_TAG chunks processed by the real_parse_headers function in demux_real.c; which allows remote attackers to cause a denial of service (NULL pointer dereference and crash) or possibly execute arbitrary code via a crafted value.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5241</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5241" source="CVE"/>
	<description>
	Integer underflow in demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, allows remote attackers to cause a denial of service (crash) via a crafted media file that results in a small value of moov_atom_size in a compressed MOV (aka CMOV_ATOM).
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5242</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5242" source="CVE"/>
	<description>
	demux_qt.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, does not validate the count field before calling calloc for STSD_ATOM atom allocation, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted media file.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5243</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5243" source="CVE"/>
	<description>
	The real_parse_headers function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, relies on an untrusted input length value to "reindex into an allocated buffer," which allows remote attackers to cause a denial of service (crash) via a crafted value, probably an array index error.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5244</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5244" source="CVE"/>
	<description>
	Unspecified vulnerability in xine-lib before 1.1.15 has unknown impact and attack vectors related to libfaad.  NOTE: due to the lack of details, it is not clear whether this is an issue in xine-lib or in libfaad.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5245</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5245" source="CVE"/>
	<description>
	xine-lib before 1.1.15 performs V4L video frame preallocation before ascertaining the required length, which has unknown impact and attack vectors, possibly related to a buffer overflow in the open_video_capture_device function in src/input/input_v4l.c.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5246</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5246" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5246" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in xine-lib before 1.1.15 allow remote attackers to execute arbitrary code via vectors that send ID3 data to the (1) id3v22_interp_frame and (2) id3v24_interp_frame functions in src/demuxers/id3.c.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5247</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5247" source="CVE"/>
	<description>
	The real_parse_audio_specific_data function in demux_real.c in xine-lib 1.1.12, and other 1.1.15 and earlier versions, uses an untrusted height (aka codec_data_length) value as a divisor, which allow remote attackers to cause a denial of service (divide-by-zero error and crash) via a zero value.
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5248</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5248" source="CVE"/>
	<description>
	xine-lib before 1.1.15 allows remote attackers to cause a denial of service (crash) via "MP3 files with metadata consisting only of separators."
	</description>
 </metadata>
<!-- 5bc4226668b007cb3ed8f41a7bb4cf5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009049647" comment="xine-devel less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049650" comment="xine-extra less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049648" comment="xine-lib-32bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049651" comment="xine-lib-64bit less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049652" comment="xine-lib-x86 less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049649" comment="xine-lib less than 1.1.1-24.43"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009049653" comment="xine-ui less than 0.99.4-32.39"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5314</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5314" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5314" source="CVE"/>
	<description>
	Stack consumption vulnerability in libclamav/special.c in ClamAV before 0.94.2 allows remote attackers to cause a denial of service (daemon crash) via a crafted JPEG file, related to the cli_check_jpeg_exploit, jpeg_check_photoshop, and jpeg_check_photoshop_8bim functions.
	</description>
 </metadata>
<!-- fe678c65175428f4b55e990a31ce0b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051200" comment="clamav less than 0.94.2-1.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5339</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5339" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to perform network connections to unauthorized hosts via unknown vectors, aka CR 6727079.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5340</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5340" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted JWS applications to gain privileges to access local files or applications via unknown vectors, aka 6727081.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5342</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5342" source="CVE"/>
	<description>
	Unspecified vulnerability in the BasicService for Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted downloaded applications to cause local files to be displayed in the browser of the user of the untrusted application via unknown vectors, aka 6767668.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5343</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5343" source="CVE"/>
	<description>
	Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows remote attackers to make unauthorized network connections and hijack HTTP sessions via a crafted file that validates as both a GIF and a Java JAR file, aka "GIFAR" and CR 6707535.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5344</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5344" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5344" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Web Start (JWS) and Java Plug-in with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applets to read arbitrary files and make unauthorized network connections via unknown vectors related to applet classloading, aka 6716217.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5345</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5345" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) with Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier allows code that is loaded from a local filesystem to read arbitrary files and make unauthorized connections to localhost via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5346</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5346" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5346" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 or earlier allows untrusted applets and applications to read arbitrary memory via a crafted ZIP file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5348</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5348" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier, when using Kerberos authentication, allows remote attackers to cause a denial of service (OS resource consumption) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5349</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-5349" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5349" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows remote attackers to cause a denial of service (CPU consumption) via a crafted RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 82cdeeaf145bab6cfd200feb8ad71d89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055404" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055405" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055406" comment="java-1_4_2-ibm less than 1.4.2_sr13.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- fc01184d4545c6e564df463857033c91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055113" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.1-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055114" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.1-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055115" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.1-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055116" comment="java-1_4_2-ibm less than 1.4.2_sr13.1-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5350</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5350" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5350" source="CVE"/>
	<description>
	Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows untrusted applications and applets to list the contents of the operating user's directory via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5351</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5351" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier accepts UTF-8 encodings that are not the "shortest" form, which makes it easier for attackers to bypass protection mechanisms for other applications that rely on shortest-form UTF-8 encodings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5353</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5353" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5353" source="CVE"/>
	<description>
	The Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier does not properly enforce context of ZoneInfo objects during deserialization, which allows remote attackers to run untrusted applets and applications in a privileged context, as demonstrated by "deserializing Calendar objects".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5354</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5354" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5354" source="CVE"/>
	<description>
	Stack-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allows locally-launched and possibly remote untrusted Java applications to execute arbitrary code via a JAR file with a long Main-Class manifest entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5356</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5356" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5356" source="CVE"/>
	<description>
	Heap-based buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5357</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5357" source="CVE"/>
	<description>
	Integer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code via a crafted TrueType font file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5359</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5359" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5359" source="CVE"/>
	<description>
	Buffer overflow in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier might allow remote attackers to execute arbitrary code, related to a ConvolveOp operation in the Java AWT library.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5360</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2008-5360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5360" source="CVE"/>
	<description>
	Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; SDK and JRE 1.4.2_18 and earlier; and SDK and JRE 1.3.1_23 and earlier creates temporary files with predictable file names, which allows attackers to write malicious JAR files via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b5f93a90ccca49c5b93c0c1d88e6b799 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049011" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049012" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049013" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049014" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.2.2"/>
		</criteria>
	</criteria>
	<!-- d20981a3eab61784caa27ca70310af21 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009049015" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049016" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049017" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009049018" comment="java-1_4_2-ibm less than 1.4.2_sr13-0.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5498" source="CVE"/>
	<description>
	Array index error in the imageRotate function in PHP 5.2.8 and earlier allows context-dependent attackers to read the contents of arbitrary memory locations via a crafted value of the third argument (aka the bgd_color or clrBack argument) for an indexed image.
	</description>
 </metadata>
<!-- b69f335bec3b7dca987fdc531b513a07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051321" comment="apache2-mod_php5 less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051322" comment="php5-bcmath less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051323" comment="php5-bz2 less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051324" comment="php5-calendar less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051325" comment="php5-ctype less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051326" comment="php5-curl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051327" comment="php5-dba less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051328" comment="php5-dbase less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051329" comment="php5-devel less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051330" comment="php5-dom less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051331" comment="php5-exif less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051332" comment="php5-fastcgi less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051333" comment="php5-ftp less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051334" comment="php5-gd less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051335" comment="php5-gettext less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051336" comment="php5-gmp less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051337" comment="php5-iconv less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051338" comment="php5-imap less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051340" comment="php5-ldap less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051341" comment="php5-mbstring less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051342" comment="php5-mcrypt less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051343" comment="php5-mhash less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051344" comment="php5-mysql less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051345" comment="php5-ncurses less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051346" comment="php5-odbc less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051347" comment="php5-openssl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051348" comment="php5-pcntl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051349" comment="php5-pdo less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051350" comment="php5-pear less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051351" comment="php5-pgsql less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051352" comment="php5-posix less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051353" comment="php5-pspell less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051354" comment="php5-shmop less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051355" comment="php5-snmp less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051356" comment="php5-soap less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051357" comment="php5-sockets less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051358" comment="php5-sqlite less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051359" comment="php5-suhosin less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051360" comment="php5-sysvmsg less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051361" comment="php5-sysvsem less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051362" comment="php5-sysvshm less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051369" comment="php5-tidy less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051363" comment="php5-tokenizer less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051364" comment="php5-wddx less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051365" comment="php5-xmlreader less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051366" comment="php5-xmlrpc less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051367" comment="php5-xsl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051368" comment="php5-zlib less than 5.2.5-9.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5500" source="CVE"/>
	<description>
	The layout engine in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to cause a denial of service (crash) and possibly trigger memory corruption via vectors related to (1) a reachable assertion or (2) an integer overflow.
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5503</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5503" source="CVE"/>
	<description>
	The loadBindingDocument function in Mozilla Firefox 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not perform any security checks related to the same-domain policy, which allows remote attackers to read or access data from other domains via crafted XBL bindings.
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5506</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5506" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy by causing the browser to issue an XMLHttpRequest to an attacker-controlled resource that uses a 302 redirect to a resource in a different domain, then reading content from the response, aka "response disclosure."
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5507</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5507" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to bypass the same origin policy and access portions of data from another domain via a JavaScript URL that redirects to the target resource, which generates an error if the target data does not have JavaScript syntax, which can be accessed using the window.onerror DOM API.
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5508</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5508" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 does not properly parse URLs with leading whitespace or control characters, which might allow remote attackers to misrepresent URLs and simplify phishing attacks.
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5510</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5510" source="CVE"/>
	<description>
	The CSS parser in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 ignores the '\0' escaped null character, which might allow remote attackers to bypass protection mechanisms such as sanitization routines.
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5511</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5511" source="CVE"/>
	<description>
	Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allows remote attackers to bypass the same origin policy and conduct cross-site scripting (XSS) attacks via an XBL binding to an "unloaded document."
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5512</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5512" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Mozilla Firefox 3.x before 3.0.5 and 2.x before 2.0.0.19, Thunderbird 2.x before 2.0.0.19, and SeaMonkey 1.x before 1.1.14 allow remote attackers to run arbitrary JavaScript with chrome privileges via unknown vectors in which "page content can pollute XPCNativeWrappers."
	</description>
 </metadata>
<!-- 541ba20ce3672e889b13f6d1c3f1f63d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051405" comment="epiphany less than 1.8.5-14.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051406" comment="gecko-sdk less than 1.8.0.14eol-0.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5515</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5515" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 80929169daa1efe3e09dfd990377bfc6 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059325" comment="tomcat5-admin-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059326" comment="tomcat5-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059327" comment="tomcat5 less than 5.5.27-0.9.1"/>
		</criteria>
	</criteria>
	<!-- aab84f6d4c90644877def4aa3f3f12b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053705" comment="tomcat5-admin-webapps less than 5.0.30-27.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053706" comment="tomcat5-webapps less than 5.0.30-27.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053707" comment="tomcat5 less than 5.0.30-27.40"/>
		</criteria>
	</criteria>
	<!-- f4a91f888d8fc90949fa1c83eee4f030 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059336" comment="tomcat5-admin-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059337" comment="tomcat5-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059338" comment="tomcat5 less than 5.0.30-27.42"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5557</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5557" source="CVE"/>
	<description>
	Heap-based buffer overflow in ext/mbstring/libmbfl/filters/mbfilter_htmlent.c in the mbstring extension in PHP 4.3.0 through 5.2.6 allows context-dependent attackers to execute arbitrary code via a crafted string containing an HTML entity, which is not properly handled during Unicode conversion, related to the (1) mb_convert_encoding, (2) mb_check_encoding, (3) mb_convert_variables, and (4) mb_parse_str functions.
	</description>
 </metadata>
<!-- 11f3a457021e7705be0bbc1e89bca550 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051497" comment="apache2-mod_php5 less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051498" comment="php5-bcmath less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051499" comment="php5-bz2 less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051500" comment="php5-calendar less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051501" comment="php5-ctype less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051502" comment="php5-curl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051503" comment="php5-dba less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051504" comment="php5-dbase less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051505" comment="php5-devel less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051506" comment="php5-dom less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051507" comment="php5-exif less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051508" comment="php5-fastcgi less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051509" comment="php5-ftp less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051510" comment="php5-gd less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051511" comment="php5-gettext less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051512" comment="php5-gmp less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051513" comment="php5-iconv less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051514" comment="php5-imap less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051516" comment="php5-ldap less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051517" comment="php5-mbstring less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051518" comment="php5-mcrypt less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051519" comment="php5-mhash less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051520" comment="php5-mysql less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051521" comment="php5-ncurses less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051522" comment="php5-odbc less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051523" comment="php5-openssl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051524" comment="php5-pcntl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051525" comment="php5-pdo less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051526" comment="php5-pear less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051527" comment="php5-pgsql less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051528" comment="php5-posix less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051529" comment="php5-pspell less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051530" comment="php5-shmop less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051531" comment="php5-snmp less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051532" comment="php5-soap less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051533" comment="php5-sockets less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051534" comment="php5-sqlite less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051535" comment="php5-suhosin less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051536" comment="php5-sysvmsg less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051537" comment="php5-sysvsem less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051538" comment="php5-sysvshm less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051545" comment="php5-tidy less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051539" comment="php5-tokenizer less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051540" comment="php5-wddx less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051541" comment="php5-xmlreader less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051542" comment="php5-xmlrpc less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051543" comment="php5-xsl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051544" comment="php5-zlib less than 5.2.5-9.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5624</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-5624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5624" source="CVE"/>
	<description>
	PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5625</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-5625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5625" source="CVE"/>
	<description>
	PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5658</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5658" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5658" source="CVE"/>
	<description>
	Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.
	</description>
 </metadata>
<!-- 11f3a457021e7705be0bbc1e89bca550 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051497" comment="apache2-mod_php5 less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051498" comment="php5-bcmath less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051499" comment="php5-bz2 less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051500" comment="php5-calendar less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051501" comment="php5-ctype less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051502" comment="php5-curl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051503" comment="php5-dba less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051504" comment="php5-dbase less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051505" comment="php5-devel less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051506" comment="php5-dom less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051507" comment="php5-exif less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051508" comment="php5-fastcgi less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051509" comment="php5-ftp less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051510" comment="php5-gd less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051511" comment="php5-gettext less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051512" comment="php5-gmp less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051513" comment="php5-iconv less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051514" comment="php5-imap less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051516" comment="php5-ldap less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051517" comment="php5-mbstring less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051518" comment="php5-mcrypt less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051519" comment="php5-mhash less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051520" comment="php5-mysql less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051521" comment="php5-ncurses less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051522" comment="php5-odbc less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051523" comment="php5-openssl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051524" comment="php5-pcntl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051525" comment="php5-pdo less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051526" comment="php5-pear less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051527" comment="php5-pgsql less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051528" comment="php5-posix less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051529" comment="php5-pspell less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051530" comment="php5-shmop less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051531" comment="php5-snmp less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051532" comment="php5-soap less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051533" comment="php5-sockets less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051534" comment="php5-sqlite less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051535" comment="php5-suhosin less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051536" comment="php5-sysvmsg less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051537" comment="php5-sysvsem less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051538" comment="php5-sysvshm less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051545" comment="php5-tidy less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051539" comment="php5-tokenizer less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051540" comment="php5-wddx less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051541" comment="php5-xmlreader less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051542" comment="php5-xmlrpc less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051543" comment="php5-xsl less than 5.2.5-9.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051544" comment="php5-zlib less than 5.2.5-9.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5702</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5702" source="CVE"/>
	<description>
	Buffer underflow in the ibwdt_ioctl function in drivers/watchdog/ib700wdt.c in the Linux kernel before 2.6.28-rc1 might allow local users to have an unknown impact via a certain /dev/watchdog WDIOC_SETTIMEOUT IOCTL call.
	</description>
 </metadata>
<!-- 9e461dcf8400c191f47c72c26b2f2ea4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050816" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050817" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050818" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050819" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050820" comment="kernel-rt less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050821" comment="kernel-rt_bigsmp less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050822" comment="kernel-rt_debug less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050823" comment="kernel-rt_timing less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050824" comment="kernel-source less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050825" comment="kernel-syms less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050826" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050827" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050828" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050829" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050830" comment="ofed-doc less than 1.3-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050831" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050832" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050833" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050834" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050835" comment="ofed less than 1.3-0.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5718</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-5718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5718" source="CVE"/>
	<description>
	The papd daemon in Netatalk before 2.0.4-beta2, when using certain variables in a pipe command for the print file, allows remote attackers to execute arbitrary commands via shell metacharacters in a print request, as demonstrated using a crafted Title.
	</description>
 </metadata>
<!-- d203870fdeddc3de6f61cbfda7e04671 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051558" comment="netatalk-devel less than 2.0.3-21.8"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5814</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5814" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in PHP, possibly 5.2.7 and earlier, when display_errors is enabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.  NOTE: because of the lack of details, it is unclear whether this is related to CVE-2006-0208.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5824</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5824" source="CVE"/>
	<description>
	Heap-based buffer overflow in msadpcm.c in libaudiofile in audiofile 0.2.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WAV file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 261fc81e3f39aee17cd40426f48dcdb2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067079" comment="audiofile-32bit less than 0.2.6-17.10.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067082" comment="audiofile-64bit less than 0.2.6-17.10.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067080" comment="audiofile-devel less than 0.2.6-17.10.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067083" comment="audiofile-x86 less than 0.2.6-17.10.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067081" comment="audiofile less than 0.2.6-17.10.14"/>
		</criteria>
	</criteria>
	<!-- 3d7f6c9b75c25202dfe77e4fa2f60506 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066633" comment="audiofile-32bit less than 0.2.6-17.10.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066628" comment="audiofile-32bit less than 0.2.6-17.10.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066634" comment="audiofile-64bit less than 0.2.6-17.10.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066629" comment="audiofile-devel less than 0.2.6-17.10.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066630" comment="audiofile-devel less than 0.2.6-17.10.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066635" comment="audiofile-x86 less than 0.2.6-17.10.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066631" comment="audiofile less than 0.2.6-17.10.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066632" comment="audiofile less than 0.2.6-17.10.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066628" comment="audiofile-32bit less than 0.2.6-17.10.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066629" comment="audiofile-devel less than 0.2.6-17.10.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066631" comment="audiofile less than 0.2.6-17.10.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20085913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-5913</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-5913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5913" source="CVE"/>
	<description>
	The Math.random function in the JavaScript implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, uses a random number generator that is seeded only once per browser session, which makes it easier for remote attackers to track a user, or trick a user into acting upon a spoofed pop-up message, by calculating the seed value, related to a "temporary footprint" and an "in-session phishing attack."
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6123</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-6123" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6123" source="CVE"/>
	<description>
	The netsnmp_udp_fmtaddr function (snmplib/snmpUDPDomain.c) in net-snmp 5.0.9 through 5.4.2.1, when using TCP wrappers for client authorization, does not properly parse hosts.allow rules, which allows remote attackers to bypass intended access restrictions and execute SNMP queries, related to "source/destination IP address confusion."
	</description>
 </metadata>
<!-- 12c0bfdeb21b1f939e3da99652204d52 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051615" comment="net-snmp-devel-64bit less than 5.3.0.1-25.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051611" comment="net-snmp-devel less than 5.3.0.1-25.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6218</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2008-6218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218" source="CVE"/>
	<description>
	Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 609aeaffe7658a6e23df39f586c9edb6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria></criteria>
	<!-- cfe75a17284d23a11571eeefdcbad4a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6679</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-6679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6679" source="CVE"/>
	<description>
	Buffer overflow in the BaseFont writer module in Ghostscript 8.62, and possibly other versions, allows remote attackers to cause a denial of service (ps2pdf crash) and possibly execute arbitrary code via a crafted Postscript file.
	</description>
 </metadata>
<!-- c7c8eefdde3a0078cda443e72602886a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047618" comment="ghostscript-fonts-rus less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047619" comment="ghostscript-omni less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047620" comment="libgimpprint-devel less than 4.2.7-62.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20086680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-6680</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2008-6680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6680" source="CVE"/>
	<description>
	libclamav/pe.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (crash) via a crafted EXE file that triggers a divide-by-zero error.
	</description>
 </metadata>
<!-- 0524ba35285ff647ef90b465f5230068 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051619" comment="clamav less than 0.95-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7247</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-7247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7247" source="CVE"/>
	<description>
	sql/sql_table.cc in MySQL 5.0.x through 5.0.88, 5.1.x through 5.1.41, and 6.0 before 6.0.9-alpha, when the data home directory contains a symlink to a different filesystem, allows remote authenticated users to bypass intended access restrictions by calling CREATE TABLE with a (1) DATA DIRECTORY or (2) INDEX DIRECTORY argument referring to a subdirectory that requires following this symlink.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 71d78dc72e348aa31062cbc12a65c867 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058927" comment="mysql-bench less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f637910c82f5652219cfb8cf0ba4069f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058936" comment="mysql-bench less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058934" comment="mysql-shared-64bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058935" comment="mysql-shared-x86 less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7248</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-7248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7248" source="CVE"/>
	<description>
	Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27f6dec66fef609cc15f47c78edbc6e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058392" comment="rubygem-actionpack-2_0 less than 2.0.2-0.8.2"/>
	</criteria>
	<!-- 5a1747eaf95d5d08c71e444e9e421c5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058393" comment="rubygem-actionpack-2_0 less than 2.0.2-0.9.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20087270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2008-7270</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2008-7270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7270" source="CVE"/>
	<description>
	OpenSSL before 0.9.8j, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the use of a disabled cipher via vectors involving sniffing network traffic to discover a session identifier, a different vulnerability than CVE-2010-4180.
	</description>
 </metadata>
<!-- 9402e64690b1a9a7f760ca687f37f7aa -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064327" comment="openssl-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064331" comment="openssl-64bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064328" comment="openssl-devel-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064332" comment="openssl-devel-64bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064329" comment="openssl-devel less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064333" comment="openssl-doc less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064334" comment="openssl-x86 less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064330" comment="openssl less than 0.9.8a-18.43.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064327" comment="openssl-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064328" comment="openssl-devel-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064329" comment="openssl-devel less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064333" comment="openssl-doc less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064330" comment="openssl less than 0.9.8a-18.43.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064333" comment="openssl-doc less than 0.9.8a-18.43.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0021" source="CVE"/>
	<description>
	NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- 6c2f4e0b04b91b771c13c769d583ff4c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051622" comment="xntp-doc less than 4.2.4p3-48.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0023</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0023" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0023" source="CVE"/>
	<description>
	The apr_strmatch_precompile function in strmatch/apr_strmatch.c in Apache APR-util before 1.3.5 allows remote attackers to cause a denial of service (daemon crash) via crafted input involving (1) a .htaccess file used with the Apache HTTP Server, (2) the SVNMasterURI directive in the mod_dav_svn module in the Apache HTTP Server, (3) the mod_apreq2 module for the Apache HTTP Server, or (4) an application that uses the libapreq2 library, which triggers a heap-based buffer underflow.
	</description>
 </metadata>
<!-- 6e86bacfc257d2963aaba9406ac8d6cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053413" comment="libapr-util1-devel-64bit less than 1.2.2-13.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053410" comment="libapr-util1-devel less than 1.2.2-13.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0025</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0025" source="CVE"/>
	<description>
	BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8503611390c97382efd03aa6e16c5621 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053683" comment="bind-chrootenv less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053684" comment="bind-devel less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053685" comment="bind-doc less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053686" comment="bind-libs-32bit less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053687" comment="bind-libs less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053688" comment="bind-utils less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053689" comment="bind less than 9.3.4-1.20.7"/>
		</criteria>
	</criteria>
	<!-- 93598a8dd9d9622b980c3c2d7fdfcc61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051647" comment="bind-chrootenv less than 9.3.4-1.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051648" comment="bind-devel-64bit less than 9.3.4-1.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051649" comment="bind-devel less than 9.3.4-1.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051650" comment="bind-doc less than 9.3.4-1.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051653" comment="bind less than 9.3.4-1.26"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0028</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028" source="CVE"/>
	<description>
	The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f9272102cdb11fea73949ffdb5ba881 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
	<!-- 8c191558bacc4e54ae26ddcf21d10f9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- 9e461dcf8400c191f47c72c26b2f2ea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050816" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050817" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050818" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050819" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050820" comment="kernel-rt less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050821" comment="kernel-rt_bigsmp less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050822" comment="kernel-rt_debug less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050823" comment="kernel-rt_timing less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050824" comment="kernel-source less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050825" comment="kernel-syms less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050826" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050827" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050828" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050829" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050830" comment="ofed-doc less than 1.3-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050831" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050832" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050833" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050834" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050835" comment="ofed less than 1.3-0.32"/>
		</criteria>
	</criteria>
	<!-- d70827089b862762d58e4a5f83a612df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- fa9be097c78c2f4acb003b27ea5b6cce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048452" comment="kernel-xenpae less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0033</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0033" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0033" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header.
	</description>
 </metadata>
<!-- aab84f6d4c90644877def4aa3f3f12b7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053705" comment="tomcat5-admin-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053706" comment="tomcat5-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053707" comment="tomcat5 less than 5.0.30-27.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0037</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0037" source="CVE"/>
	<description>
	The redirect implementation in curl and libcurl 5.11 through 7.19.3, when CURLOPT_FOLLOWLOCATION is enabled, accepts arbitrary Location values, which might allow remote HTTP servers to (1) trigger arbitrary requests to intranet servers, (2) read or overwrite arbitrary files via a redirect to a file: URL, or (3) execute arbitrary commands via a redirect to an scp: URL.
	</description>
 </metadata>
<!-- 44a6e12283cbdf203f82e3c3b4ce2641 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051699" comment="curl-devel less than 7.15.1-19.11"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0049</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0049" source="CVE"/>
	<description>
	Belgian eID middleware (eidlib) 2.6.0 and earlier does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
	</description>
 </metadata>
<!-- d0b76e5ed8a4d2ac1539fe9ecd2577fd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051788" comment="eID-belgium less than 2.5.9-26.12"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0065</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0065" source="CVE"/>
	<description>
	Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large stream ID.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f9272102cdb11fea73949ffdb5ba881 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
	<!-- 8c191558bacc4e54ae26ddcf21d10f9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- 9e461dcf8400c191f47c72c26b2f2ea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009050816" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050817" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050818" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050819" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.21-1.20"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050820" comment="kernel-rt less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050821" comment="kernel-rt_bigsmp less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050822" comment="kernel-rt_debug less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050823" comment="kernel-rt_timing less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050824" comment="kernel-source less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050825" comment="kernel-syms less than 2.6.22.19-0.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050826" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050827" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050828" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050829" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050830" comment="ofed-doc less than 1.3-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050831" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050832" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050833" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050834" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009050835" comment="ofed less than 1.3-0.32"/>
		</criteria>
	</criteria>
	<!-- d70827089b862762d58e4a5f83a612df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- fa9be097c78c2f4acb003b27ea5b6cce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048452" comment="kernel-xenpae less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0135</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0135" source="CVE"/>
	<description>
	Multiple integer overflows in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to execute arbitrary code via an Audible Audio (.aa) file with a large (1) nlen or (2) vlen Tag value, each of which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- f71ac69b3b8910e2f2aaa82e23c29999 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051813" comment="amarok-libvisual less than 1.4.8-13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051814" comment="amarok-xine less than 1.4.8-13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051816" comment="amarok less than 1.4.8-13.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0136</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0136" source="CVE"/>
	<description>
	Multiple array index errors in the Audible::Tag::readTag function in metadata/audible/audibletag.cpp in Amarok 1.4.10 through 2.0.1 allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via an Audible Audio (.aa) file with a crafted (1) nlen or (2) vlen Tag value, each of which can lead to an invalid pointer dereference, or the writing of a 0x00 byte to an arbitrary memory location, after an allocation failure.
	</description>
 </metadata>
<!-- f71ac69b3b8910e2f2aaa82e23c29999 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051813" comment="amarok-libvisual less than 1.4.8-13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051814" comment="amarok-xine less than 1.4.8-13.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051816" comment="amarok less than 1.4.8-13.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0146</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2SymbolDict::setBitmap and (2) JBIG2Stream::readSymbolDictSeg.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0147</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147" source="CVE"/>
	<description>
	Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allow remote attackers to cause a denial of service (crash) via a crafted PDF file, related to (1) JBIG2Stream::readSymbolDictSeg, (2) JBIG2Stream::readSymbolDictSeg, and (3) JBIG2Stream::readGenericBitmap.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0153</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0153" source="CVE"/>
	<description>
	International Components for Unicode (ICU) 4.0, 3.6, and other 3.x versions, as used in Apple Mac OS X 10.5 before 10.5.7, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Fedora 9 and 10, and possibly other operating systems, does not properly handle invalid byte sequences during Unicode conversion, which might allow remote attackers to conduct cross-site scripting (XSS) attacks.
	</description>
 </metadata>
<!-- 87739b2d1a14057a90f469e46022de68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053892" comment="icu-data less than 3.4-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053883" comment="icu less than 3.4-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053887" comment="libicu-devel-32bit less than 3.4-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053888" comment="libicu-devel-64bit less than 3.4-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053889" comment="libicu-devel less than 3.4-16.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053890" comment="libicu-doc less than 3.4-16.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0159</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159" source="CVE"/>
	<description>
	Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
	</description>
 </metadata>
<!-- 7ea5df6aa6b065af0491ec2578421b95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051869" comment="xntp-doc less than 4.2.4p3-48.13.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0165</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0165" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, as used in Poppler and other products, when running on Mac OS X, has unspecified impact, related to "g*allocn."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0166" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a free of uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0186</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0186" source="CVE"/>
	<description>
	Integer overflow in libsndfile 1.0.18, as used in Winamp and other products, allows context-dependent attackers to execute arbitrary code via crafted description chunks in a CAF audio file, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 9d01635a1538fb8130857ff9dcad965b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051900" comment="libsndfile-devel less than 1.0.12-13.10"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0196" source="CVE"/>
	<description>
	Heap-based buffer overflow in the big2_decode_symbol_dict function (jbig2_symbol_dict.c) in the JBIG2 decoding library (jbig2dec) in Ghostscript 8.64, and probably earlier versions, allows remote attackers to execute arbitrary code via a PDF file with a JBIG2 symbol dictionary segment with a large run length value.
	</description>
 </metadata>
<!-- c7c8eefdde3a0078cda443e72602886a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047618" comment="ghostscript-fonts-rus less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047619" comment="ghostscript-omni less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047620" comment="libgimpprint-devel less than 4.2.7-62.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0200</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0200" source="CVE"/>
	<description>
	Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 2cfb18f7de248548d01ddd72c1aaa729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054600" comment="OpenOffice_org-cs less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054602" comment="OpenOffice_org-de less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054605" comment="OpenOffice_org-es less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054607" comment="OpenOffice_org-fr less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054608" comment="OpenOffice_org-galleries less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054609" comment="OpenOffice_org-gnome less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054612" comment="OpenOffice_org-hu less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054613" comment="OpenOffice_org-it less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054614" comment="OpenOffice_org-ja less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054615" comment="OpenOffice_org-kde less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054617" comment="OpenOffice_org-mono less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054622" comment="OpenOffice_org-pl less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054623" comment="OpenOffice_org-pt-BR less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054625" comment="OpenOffice_org-sk less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054628" comment="OpenOffice_org-zh-CN less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054629" comment="OpenOffice_org-zh-TW less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054631" comment="OpenOffice_org less than 3.1.1-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0201</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0201" source="CVE"/>
	<description>
	Heap-based buffer overflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via unspecified records in a crafted Word document, related to "table parsing."
	</description>
 </metadata>
<!-- 2cfb18f7de248548d01ddd72c1aaa729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054600" comment="OpenOffice_org-cs less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054602" comment="OpenOffice_org-de less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054605" comment="OpenOffice_org-es less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054607" comment="OpenOffice_org-fr less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054608" comment="OpenOffice_org-galleries less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054609" comment="OpenOffice_org-gnome less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054612" comment="OpenOffice_org-hu less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054613" comment="OpenOffice_org-it less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054614" comment="OpenOffice_org-ja less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054615" comment="OpenOffice_org-kde less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054617" comment="OpenOffice_org-mono less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054622" comment="OpenOffice_org-pl less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054623" comment="OpenOffice_org-pt-BR less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054625" comment="OpenOffice_org-sk less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054628" comment="OpenOffice_org-zh-CN less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054629" comment="OpenOffice_org-zh-TW less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054631" comment="OpenOffice_org less than 3.1.1-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0217</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0217" source="CVE"/>
	<description>
	The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17aa6adc1c5e58a79af02c479d95aab1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058675" comment="OpenOffice_org-cs less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058677" comment="OpenOffice_org-de less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058678" comment="OpenOffice_org-es less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058680" comment="OpenOffice_org-fr less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058681" comment="OpenOffice_org-galleries less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058682" comment="OpenOffice_org-gnome less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058685" comment="OpenOffice_org-hu less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058686" comment="OpenOffice_org-it less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058687" comment="OpenOffice_org-ja less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058688" comment="OpenOffice_org-kde less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058689" comment="OpenOffice_org-mono less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058694" comment="OpenOffice_org-pl less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058695" comment="OpenOffice_org-pt-BR less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058697" comment="OpenOffice_org-sk less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058700" comment="OpenOffice_org-zh-CN less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058701" comment="OpenOffice_org-zh-TW less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058703" comment="OpenOffice_org less than 3.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8cf721e6c038d1eb986a470c51370399 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058707" comment="OpenOffice_org-cs less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058709" comment="OpenOffice_org-de less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058712" comment="OpenOffice_org-es less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058714" comment="OpenOffice_org-fr less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058715" comment="OpenOffice_org-galleries less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058716" comment="OpenOffice_org-gnome less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058719" comment="OpenOffice_org-hu less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058720" comment="OpenOffice_org-it less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058721" comment="OpenOffice_org-ja less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058722" comment="OpenOffice_org-kde less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058724" comment="OpenOffice_org-mono less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058729" comment="OpenOffice_org-pl less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058730" comment="OpenOffice_org-pt-BR less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058732" comment="OpenOffice_org-sk less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058735" comment="OpenOffice_org-zh-CN less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058736" comment="OpenOffice_org-zh-TW less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058738" comment="OpenOffice_org less than 3.2-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0269</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269" source="CVE"/>
	<description>
	fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index.
	</description>
 </metadata>
<!-- 9e461dcf8400c191f47c72c26b2f2ea4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050816" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050817" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050818" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050819" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050820" comment="kernel-rt less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050821" comment="kernel-rt_bigsmp less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050822" comment="kernel-rt_debug less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050823" comment="kernel-rt_timing less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050824" comment="kernel-source less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050825" comment="kernel-syms less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050826" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050827" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050828" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050829" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050830" comment="ofed-doc less than 1.3-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050831" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050832" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050833" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050834" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050835" comment="ofed less than 1.3-0.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0322</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322" source="CVE"/>
	<description>
	drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/.
	</description>
 </metadata>
<!-- 9e461dcf8400c191f47c72c26b2f2ea4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009050816" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050817" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050818" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050819" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.21-1.20"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050820" comment="kernel-rt less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050821" comment="kernel-rt_bigsmp less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050822" comment="kernel-rt_debug less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050823" comment="kernel-rt_timing less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050824" comment="kernel-source less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050825" comment="kernel-syms less than 2.6.22.19-0.21"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050826" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050827" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050828" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050829" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.17"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050830" comment="ofed-doc less than 1.3-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050831" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050832" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050833" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050834" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.21-0.32"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009050835" comment="ofed less than 1.3-0.32"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0368</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0368" source="CVE"/>
	<description>
	OpenSC before 0.11.7 allows physically proximate attackers to bypass intended PIN requirements and read private data objects via a (1) low level APDU command or (2) debugging tool, as demonstrated by reading the 4601 or 4701 file with the opensc-explorer or opensc-tool program.
	</description>
 </metadata>
<!-- de2d7e6eead2a8e6c8e7a406d4567a95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051999" comment="opensc-32bit less than 0.9.6-17.12"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052002" comment="opensc-devel less than 0.9.6-17.12"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0547" source="CVE"/>
	<description>
	Evolution 2.22.3.1 checks S/MIME signatures against a copy of the e-mail text within a signed-data blob, not the copy of the e-mail text displayed to the user, which allows remote attackers to spoof a signature by modifying the latter copy, a different vulnerability than CVE-2008-5077.
	</description>
 </metadata>
<!-- ce348cdfb35e252764bfbecf9d58b216 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060320" comment="evolution-data-server-32bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060323" comment="evolution-data-server-64bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060321" comment="evolution-data-server-devel less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060324" comment="evolution-data-server-x86 less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060322" comment="evolution-data-server less than 1.6.0-43.92.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060320" comment="evolution-data-server-32bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060321" comment="evolution-data-server-devel less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060322" comment="evolution-data-server less than 1.6.0-43.92.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0580</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0580" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
	</description>
 </metadata>
<!-- aab84f6d4c90644877def4aa3f3f12b7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053705" comment="tomcat5-admin-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053706" comment="tomcat5-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053707" comment="tomcat5 less than 5.0.30-27.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0583</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0583" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- fa2aa837e76ad0cf6e7c42e62df9fbf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052231" comment="ghostscript-fonts-rus less than 8.15.4-16.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052232" comment="ghostscript-omni less than 8.15.4-16.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052233" comment="libgimpprint-devel less than 4.2.7-62.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0584</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0584" source="CVE"/>
	<description>
	icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code by using a device file for processing a crafted image file associated with large integer values for certain sizes, related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.
	</description>
 </metadata>
<!-- fa2aa837e76ad0cf6e7c42e62df9fbf1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052231" comment="ghostscript-fonts-rus less than 8.15.4-16.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052232" comment="ghostscript-omni less than 8.15.4-16.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052233" comment="libgimpprint-devel less than 4.2.7-62.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0587</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-0587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0587" source="CVE"/>
	<description>
	Multiple integer overflows in Evolution Data Server (aka evolution-data-server) before 2.24.5 allow context-dependent attackers to execute arbitrary code via a long string that is converted to a base64 representation in (1) addressbook/libebook/e-vcard.c in evc or (2) camel/camel-mime-utils.c in libcamel.
	</description>
 </metadata>
<!-- ce348cdfb35e252764bfbecf9d58b216 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060320" comment="evolution-data-server-32bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060323" comment="evolution-data-server-64bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060321" comment="evolution-data-server-devel less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060324" comment="evolution-data-server-x86 less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060322" comment="evolution-data-server less than 1.6.0-43.92.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060320" comment="evolution-data-server-32bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060321" comment="evolution-data-server-devel less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060322" comment="evolution-data-server less than 1.6.0-43.92.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0590</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-0590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0590" source="CVE"/>
	<description>
	The ASN1_STRING_print_ex function in OpenSSL before 0.9.8k allows remote attackers to cause a denial of service (invalid memory access and application crash) via vectors that trigger printing of a (1) BMPString or (2) UniversalString with an invalid encoded length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37fc088b1ab93660b52630ed90a20583 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052269" comment="openssl-doc less than 0.9.8a-18.30"/>
	</criteria>
	<!-- 6deef59a2e94ee7d0f87aa2f497078c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
		</criteria>
	</criteria>
	<!-- 78caf50c2261c865e06e92ff68d948da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0642</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0642" source="CVE"/>
	<description>
	ext/openssl/ossl_ocsp.c in Ruby 1.8 and 1.9 does not properly check the return value from the OCSP_basic_verify function, which might allow remote attackers to successfully present an invalid X.509 certificate, possibly involving a revoked certificate.
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0663</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0663" source="CVE"/>
	<description>
	Heap-based buffer overflow in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module 1.49 for Perl might allow context-dependent attackers to execute arbitrary code via unspecified input to an application that uses the getline and pg_getline functions to read database rows.
	</description>
 </metadata>
<!-- 28003a67cf12bd4b94228157411ca13c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052306" comment="perl-DBD-Pg less than 1.43-13.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0668</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-0668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0668" source="CVE"/>
	<description>
	Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 11f9e1c3f96dd3c02b7441048c419885 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056500" comment="zope less than 2.7.8-15.15.1"/>
	</criteria>
	<!-- 23041351bb55b45b648196cea42acd08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056501" comment="zope3 less than 3.1.0-18.10.2"/>
	</criteria>
	<!-- 9ea8c1946ba825ad01a73d561cae3026 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056502" comment="zope less than 2.7.8-15.15.2"/>
	</criteria>
	<!-- c7bdbf2954159471547686bb93c4a289 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056504" comment="zope3 less than 3.1.0-18.10.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090669" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0669</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-0669" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0669" source="CVE"/>
	<description>
	Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 11f9e1c3f96dd3c02b7441048c419885 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056500" comment="zope less than 2.7.8-15.15.1"/>
	</criteria>
	<!-- 23041351bb55b45b648196cea42acd08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056501" comment="zope3 less than 3.1.0-18.10.2"/>
	</criteria>
	<!-- 9ea8c1946ba825ad01a73d561cae3026 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056502" comment="zope less than 2.7.8-15.15.2"/>
	</criteria>
	<!-- c7bdbf2954159471547686bb93c4a289 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056504" comment="zope3 less than 3.1.0-18.10.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0675</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0675" source="CVE"/>
	<description>
	The skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows local users to reset the driver statistics, related to an "inverted logic" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f9272102cdb11fea73949ffdb5ba881 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
	<!-- 8c191558bacc4e54ae26ddcf21d10f9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- d70827089b862762d58e4a5f83a612df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- fa9be097c78c2f4acb003b27ea5b6cce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048452" comment="kernel-xenpae less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0676</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0676" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676" source="CVE"/>
	<description>
	The sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f9272102cdb11fea73949ffdb5ba881 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
	<!-- 8c191558bacc4e54ae26ddcf21d10f9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
	<!-- d70827089b862762d58e4a5f83a612df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- fa9be097c78c2f4acb003b27ea5b6cce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048452" comment="kernel-xenpae less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0688</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0688" source="CVE"/>
	<description>
	Multiple buffer overflows in the CMU Cyrus SASL library before 2.1.23 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via strings that are used as input to the sasl_encode64 function in lib/saslutil.c.
	</description>
 </metadata>
<!-- e8c60aef53f7c6d2f5d71930be663ae4 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052387" comment="cyrus-sasl-otp less than 2.1.21-18.10.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052388" comment="cyrus-sasl-sqlauxprop less than 2.1.21-18.10.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0689</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-0689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0689" source="CVE"/>
	<description>
	Array index error in the (1) dtoa implementation in dtoa.c (aka pdtoa.c) and the (2) gdtoa (aka new dtoa) implementation in gdtoa/misc.c in libc, as used in multiple operating systems and products including in FreeBSD 6.4 and 7.2, NetBSD 5.0, OpenBSD 4.5, Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4, K-Meleon 1.5.3, SeaMonkey 1.1.8, and other products, allows context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large precision value in the format argument to a printf function, which triggers incorrect memory allocation and a heap-based buffer overflow during conversion to a floating-point number.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 278f9268005e0adc0cf09d11e2b20a52 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056794" comment="kdelibs3-32bit less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056800" comment="kdelibs3-64bit less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056795" comment="kdelibs3-arts-32bit less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056801" comment="kdelibs3-arts-64bit less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056802" comment="kdelibs3-arts-x86 less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056796" comment="kdelibs3-arts less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056797" comment="kdelibs3-devel less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056798" comment="kdelibs3-doc less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056803" comment="kdelibs3-x86 less than 3.5.1-49.53.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056799" comment="kdelibs3 less than 3.5.1-49.53.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056797" comment="kdelibs3-devel less than 3.5.1-49.53.1"/>
		</criteria></criteria>
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
	<!-- d3f3f7fc8e2b8ab82212a63c37efbecd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056676" comment="kdelibs3-devel less than 3.5.1-49.52.2"/>
	</criteria>
	<!-- dd29bade9f7bbb05007b9a7cd8d845db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056070" comment="mozilla-nspr-32bit less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056073" comment="mozilla-nspr-64bit less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056071" comment="mozilla-nspr-devel less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056074" comment="mozilla-nspr-x86 less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056072" comment="mozilla-nspr less than 4.8.2-1.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0692</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0692" source="CVE"/>
	<description>
	Stack-based buffer overflow in the script_write_params method in client/dhclient.c in ISC DHCP dhclient 4.1 before 4.1.0p1, 4.0 before 4.0.1p1, 3.1 before 3.1.2p1, 3.0, and 2.0 allows remote DHCP servers to execute arbitrary code via a crafted subnet-mask option.
	</description>
 </metadata>
<!-- f8ba1c87c9b632aae917daaa99ff7563 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053438" comment="dhcp-devel less than 3.0.3-23.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053439" comment="dhcp-relay less than 3.0.3-23.55"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053440" comment="dhcp-server less than 3.0.3-23.55"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0696</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-0696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0696" source="CVE"/>
	<description>
	The dns_db_findrdataset function in db.c in named in ISC BIND 9.4 before 9.4.3-P3, 9.5 before 9.5.1-P3, and 9.6 before 9.6.1-P1, when configured as a master server, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an ANY record in the prerequisite section of a crafted dynamic update message, as exploited in the wild in July 2009.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8503611390c97382efd03aa6e16c5621 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053683" comment="bind-chrootenv less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053684" comment="bind-devel less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053685" comment="bind-doc less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053686" comment="bind-libs-32bit less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053687" comment="bind-libs less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053688" comment="bind-utils less than 9.3.4-1.20.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053689" comment="bind less than 9.3.4-1.20.7"/>
		</criteria>
	</criteria>
	<!-- cfb90517e7e930462e8ef6435b70e831 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053667" comment="bind-chrootenv less than 9.3.4-1.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053668" comment="bind-devel-64bit less than 9.3.4-1.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053669" comment="bind-devel less than 9.3.4-1.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053670" comment="bind-doc less than 9.3.4-1.29"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053673" comment="bind less than 9.3.4-1.29"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0698</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0698" source="CVE"/>
	<description>
	Integer overflow in the 4xm demuxer (demuxers/demux_4xm.c) in xine-lib 1.1.16.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a 4X movie file with a large current_track value, a similar issue to CVE-2009-0385.
	</description>
 </metadata>
<!-- 3e3b68685ad1bd712501755dadfd7b84 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052390" comment="xine-devel less than 1.1.1-24.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052393" comment="xine-extra less than 1.1.1-24.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052391" comment="xine-lib-32bit less than 1.1.1-24.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052394" comment="xine-lib-64bit less than 1.1.1-24.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052395" comment="xine-lib-x86 less than 1.1.1-24.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052392" comment="xine-lib less than 1.1.1-24.46"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052396" comment="xine-ui less than 0.99.4-32.42"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0754</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0754" source="CVE"/>
	<description>
	PHP 4.4.4, 5.1.6, and other versions, when running on Apache, allows local users to modify behavior of other sites hosted on the same web server by modifying the mbstring.func_overload setting within .htaccess, which causes this setting to be applied to other virtual hosts on the same server.
	</description>
 </metadata>
<!-- b69f335bec3b7dca987fdc531b513a07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009051321" comment="apache2-mod_php5 less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051322" comment="php5-bcmath less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051323" comment="php5-bz2 less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051324" comment="php5-calendar less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051325" comment="php5-ctype less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051326" comment="php5-curl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051327" comment="php5-dba less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051328" comment="php5-dbase less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051329" comment="php5-devel less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051330" comment="php5-dom less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051331" comment="php5-exif less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051332" comment="php5-fastcgi less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051333" comment="php5-ftp less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051334" comment="php5-gd less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051335" comment="php5-gettext less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051336" comment="php5-gmp less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051337" comment="php5-iconv less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051338" comment="php5-imap less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051340" comment="php5-ldap less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051341" comment="php5-mbstring less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051342" comment="php5-mcrypt less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051343" comment="php5-mhash less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051344" comment="php5-mysql less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051345" comment="php5-ncurses less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051346" comment="php5-odbc less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051347" comment="php5-openssl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051348" comment="php5-pcntl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051349" comment="php5-pdo less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051350" comment="php5-pear less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051351" comment="php5-pgsql less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051352" comment="php5-posix less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051353" comment="php5-pspell less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051354" comment="php5-shmop less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051355" comment="php5-snmp less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051356" comment="php5-soap less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051357" comment="php5-sockets less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051358" comment="php5-sqlite less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051359" comment="php5-suhosin less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051360" comment="php5-sysvmsg less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051361" comment="php5-sysvsem less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051362" comment="php5-sysvshm less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051369" comment="php5-tidy less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051363" comment="php5-tokenizer less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051364" comment="php5-wddx less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051365" comment="php5-xmlreader less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051366" comment="php5-xmlrpc less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051367" comment="php5-xsl less than 5.2.5-9.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051368" comment="php5-zlib less than 5.2.5-9.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0755</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0755" source="CVE"/>
	<description>
	The FormWidgetChoice::loadDefaults function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file with an invalid Form Opt entry.
	</description>
 </metadata>
<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0756</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0756" source="CVE"/>
	<description>
	The JBIG2Stream::readSymbolDictSeg function in Poppler before 0.10.4 allows remote attackers to cause a denial of service (crash) via a PDF file that triggers a parsing error, which is not properly handled by JBIG2SymbolDict::~JBIG2SymbolDict and triggers an invalid memory dereference.
	</description>
 </metadata>
<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0758</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0758" source="CVE"/>
	<description>
	The originates_from_local_legacy_unicast_socket function in avahi-core/server.c in avahi-daemon 0.6.23 does not account for the network byte order of a port number when processing incoming multicast packets, which allows remote attackers to cause a denial of service (network bandwidth and CPU consumption) via a crafted legacy unicast mDNS query packet that triggers a multicast packet storm.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a7dc4cc37271495503154c83476a0d3f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057562" comment="avahi-devel less than 0.6.5-29.22.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057560" comment="avahi-glib less than 0.6.5-29.22.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057561" comment="avahi less than 0.6.5-29.22.2"/>
		</criteria>
	</criteria>
	<!-- e3449d21d93e94ca21dab3032a76a26d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057615" comment="avahi less than 0.6.5-29.26.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057616" comment="avahi-devel less than 0.6.5-29.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057614" comment="avahi-glib less than 0.6.5-29.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057615" comment="avahi less than 0.6.5-29.26.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0781</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0781" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in jsp/cal/cal2.jsp in the calendar application in the examples web application in Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 allows remote attackers to inject arbitrary web script or HTML via the time parameter, related to "invalid HTML."
	</description>
 </metadata>
<!-- aab84f6d4c90644877def4aa3f3f12b7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053705" comment="tomcat5-admin-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053706" comment="tomcat5-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053707" comment="tomcat5 less than 5.0.30-27.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0783</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783" source="CVE"/>
	<description>
	Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application.
	</description>
 </metadata>
<!-- aab84f6d4c90644877def4aa3f3f12b7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053705" comment="tomcat5-admin-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053706" comment="tomcat5-webapps less than 5.0.30-27.40"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053707" comment="tomcat5 less than 5.0.30-27.40"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0789</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0789" source="CVE"/>
	<description>
	OpenSSL before 0.9.8k on WIN64 and certain other platforms does not properly handle a malformed ASN.1 structure, which allows remote attackers to cause a denial of service (invalid memory access and application crash) by placing this structure in the public key of a certificate, as demonstrated by an RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37fc088b1ab93660b52630ed90a20583 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052269" comment="openssl-doc less than 0.9.8a-18.30"/>
	</criteria>
	<!-- 6deef59a2e94ee7d0f87aa2f497078c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
		</criteria>
	</criteria>
	<!-- 78caf50c2261c865e06e92ff68d948da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0791</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0791" source="CVE"/>
	<description>
	Multiple integer overflows in Xpdf 2.x and 3.x and Poppler 0.x, as used in the pdftops filter in CUPS 1.1.17, 1.1.22, and 1.3.7, GPdf, and kdegraphics KPDF, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file that triggers a heap-based buffer overflow, possibly related to (1) Decrypt.cxx, (2) FoFiTrueType.cxx, (3) gmem.c, (4) JBIG2Stream.cxx, and (5) PSOutputDev.cxx in pdftops/. NOTE: the JBIG2Stream.cxx vector may overlap CVE-2009-1179.
	</description>
 </metadata>
<!-- 20b198c2cc4f80526fa7a8891b9d60f0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054167" comment="xpdf less than 3.01-21.19"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0792</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0792" source="CVE"/>
	<description>
	Multiple integer overflows in icc.c in the International Color Consortium (ICC) Format library (aka icclib), as used in Ghostscript 8.64 and earlier and Argyll Color Management System (CMS) 1.0.3 and earlier, allow context-dependent attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly execute arbitrary code by using a device file for a translation request that operates on a crafted image file and targets a certain "native color space," related to an ICC profile in a (1) PostScript or (2) PDF file with embedded images.  NOTE: this issue exists because of an incomplete fix for CVE-2009-0583.
	</description>
 </metadata>
<!-- c7c8eefdde3a0078cda443e72602886a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047618" comment="ghostscript-fonts-rus less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047619" comment="ghostscript-omni less than 8.15.4-16.11"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009047620" comment="libgimpprint-devel less than 4.2.7-62.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0799</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0799" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers an out-of-bounds read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0800</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0800" source="CVE"/>
	<description>
	Multiple "input validation flaws" in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0834</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0834" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0834" source="CVE"/>
	<description>
	The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0835</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0835" source="CVE"/>
	<description>
	The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0844</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0844" source="CVE"/>
	<description>
	The get_input_token function in the SPNEGO implementation in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3 allows remote attackers to cause a denial of service (daemon crash) and possibly obtain sensitive information via a crafted length value that triggers a buffer over-read.
	</description>
 </metadata>
<!-- 77958995d1329c7d886c1d9558d79cac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052479" comment="krb5-apps-clients less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052480" comment="krb5-apps-servers less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052482" comment="krb5-server less than 1.4.3-19.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0845</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0845" source="CVE"/>
	<description>
	The spnego_gss_accept_sec_context function in lib/gssapi/spnego/spnego_mech.c in MIT Kerberos 5 (aka krb5) 1.5 through 1.6.3, when SPNEGO is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via invalid ContextFlags data in the reqFlags field in a negTokenInit token.
	</description>
 </metadata>
<!-- 77958995d1329c7d886c1d9558d79cac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052479" comment="krb5-apps-clients less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052480" comment="krb5-apps-servers less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052482" comment="krb5-server less than 1.4.3-19.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0846</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0846" source="CVE"/>
	<description>
	The asn1_decode_generaltime function in lib/krb5/asn.1/asn1_decode.c in the ASN.1 GeneralizedTime decoder in MIT Kerberos 5 (aka krb5) before 1.6.4 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via vectors involving an invalid DER encoding that triggers a free of an uninitialized pointer.
	</description>
 </metadata>
<!-- 77958995d1329c7d886c1d9558d79cac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052479" comment="krb5-apps-clients less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052480" comment="krb5-apps-servers less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052482" comment="krb5-server less than 1.4.3-19.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0847</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0847" source="CVE"/>
	<description>
	The asn1buf_imbed function in the ASN.1 decoder in MIT Kerberos 5 (aka krb5) 1.6.3, when PK-INIT is used, allows remote attackers to cause a denial of service (application crash) via a crafted length value that triggers an erroneous malloc call, related to incorrect calculations with pointer arithmetic.
	</description>
 </metadata>
<!-- 77958995d1329c7d886c1d9558d79cac -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052479" comment="krb5-apps-clients less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052480" comment="krb5-apps-servers less than 1.4.3-19.41"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052482" comment="krb5-server less than 1.4.3-19.41"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0859</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0859" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0859" source="CVE"/>
	<description>
	The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0922</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-0922" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0922" source="CVE"/>
	<description>
	PostgreSQL before 8.3.7, 8.2.13, 8.1.17, 8.0.21, and 7.4.25 allows remote authenticated users to cause a denial of service (stack consumption and crash) by triggering a failure in the conversion of a localized error message to a client-specified encoding, as demonstrated using mismatched encoding conversion requests.
	</description>
 </metadata>
<!-- 1682f0b01f14c8eee709dd284284e011 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052503" comment="postgresql-contrib less than 8.1.17-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052500" comment="postgresql-devel less than 8.1.17-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052504" comment="postgresql-docs less than 8.1.17-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052507" comment="postgresql-server less than 8.1.17-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052508" comment="postgresql less than 8.1.17-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20090945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-0945</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-0945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0945" source="CVE"/>
	<description>
	Array index error in the insertItemBefore method in WebKit, as used in Apple Safari before 3.2.3 and 4 Public Beta, iPhone OS 1.0 through 2.2.1, iPhone OS for iPod touch 1.1 through 2.2.1, Google Chrome Stable before 1.0.154.65, and possibly other products allows remote attackers to execute arbitrary code via a document with a SVGPathList data structure containing a negative index in the (1) SVGTransformList, (2) SVGStringList, (3) SVGNumberList, (4) SVGPathSegList, (5) SVGPointList, or (6) SVGLengthList SVGList object, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bcba4f2a8ad5c321b0e01e3ec52c8c68 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056192" comment="dbus-1-qt-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056200" comment="dbus-1-qt-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056201" comment="dbus-1-qt-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056193" comment="dbus-1-qt less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056194" comment="qt-qt3support-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056202" comment="qt-qt3support-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056203" comment="qt-qt3support-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056195" comment="qt-qt3support less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056196" comment="qt-sql-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056204" comment="qt-sql-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056205" comment="qt-sql-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056197" comment="qt-sql less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056198" comment="qt-x11-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056206" comment="qt-x11-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056207" comment="qt-x11-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056199" comment="qt-x11 less than 4.3.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056208" comment="dbus-1-qt-devel less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056193" comment="dbus-1-qt less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056209" comment="qt-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056210" comment="qt-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056211" comment="qt-devel-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056212" comment="qt-devel-doc less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056202" comment="qt-qt3support-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056195" comment="qt-qt3support less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056204" comment="qt-sql-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056197" comment="qt-sql less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056206" comment="qt-x11-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056199" comment="qt-x11 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056213" comment="qt-x86 less than 4.3.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c6c0d1b1fb33dc17f19047823a06cceb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056208" comment="dbus-1-qt-devel less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056193" comment="dbus-1-qt less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056209" comment="qt-32bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056210" comment="qt-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056211" comment="qt-devel-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056212" comment="qt-devel-doc less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056202" comment="qt-qt3support-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056195" comment="qt-qt3support less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056204" comment="qt-sql-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056197" comment="qt-sql less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056206" comment="qt-x11-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056199" comment="qt-x11 less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056213" comment="qt-x86 less than 4.3.4-0.7.1"/>
		</criteria>
	</criteria>
	<!-- e3ee5f3465bf28ff10fa73651f8a68a3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064973" comment="kdegraphics3-fax less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064975" comment="kdegraphics3-pdf less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064976" comment="kdegraphics3-postscript less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064978" comment="kdegraphics3 less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064974" comment="kdegraphics3-kamera less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064977" comment="kdegraphics3-scan less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091046" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1046</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1046" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1046" source="CVE"/>
	<description>
	The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1f9272102cdb11fea73949ffdb5ba881 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
	<!-- 8c191558bacc4e54ae26ddcf21d10f9f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- d70827089b862762d58e4a5f83a612df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
	</criteria>
	<!-- fa9be097c78c2f4acb003b27ea5b6cce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009048447" comment="kernel-debug less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048448" comment="kernel-kdump less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048446" comment="kernel-xen less than 2.6.16.60-0.37_f594963d"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009048452" comment="kernel-xenpae less than 2.6.16.60-0.37_f594963d"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1072</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1072" source="CVE"/>
	<description>
	nfsd in the Linux kernel before 2.6.28.9 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash option.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1093</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1093" source="CVE"/>
	<description>
	LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1094</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1094" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1095</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1095" source="CVE"/>
	<description>
	Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1096</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1096" source="CVE"/>
	<description>
	Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1098</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1098" source="CVE"/>
	<description>
	Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1099</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1099" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1099" source="CVE"/>
	<description>
	Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1100</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1100" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1100" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) "limits on Font creation," aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4495d420cc31b3e7021a04db76636f7a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
		</criteria>
	</criteria>
	<!-- 47c718d1829393ab9c39c157cdcb2ebb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 67b3a6732def288d5f612be0e3a0ab30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056380" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1103</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1103" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1103" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to "deserializing applets," aka CR 6646860.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1104</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1104" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331.  NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1107</title>
	<affected family="unix">
		<platform>sles10-ltss.i386</platform>
		<platform>sles10-ltss.s390x</platform>
		<platform>sles10-ltss.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-1107" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1107" source="CVE"/>
	<description>
	The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a "Swing JLabel HTML parsing vulnerability," aka CR 6782871.
	</description>
 </metadata>
<!-- 4495d420cc31b3e7021a04db76636f7a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052573" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052574" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052575" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052576" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052577" comment="java-1_5_0-ibm-devel less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052578" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052579" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052580" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr9-2.2.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052581" comment="java-1_5_0-ibm less than 1.5.0_sr9-2.2.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1179" source="CVE"/>
	<description>
	Integer overflow in the JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1180</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1180" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1181" source="CVE"/>
	<description>
	The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (crash) via a crafted PDF file that triggers a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1182" source="CVE"/>
	<description>
	Multiple buffer overflows in the JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allow remote attackers to execute arbitrary code via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1183" source="CVE"/>
	<description>
	The JBIG2 MMR decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted PDF file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aa3329913502471a5e2d7dd3b9d5b416 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051851" comment="xpdf less than 3.01-21.16"/>
	</criteria>
	<!-- dddee8496c86fbb94c0afe195fbe5bd5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051856" comment="poppler-devel less than 0.4.4-19.23"/>
	</criteria>
	<!-- f4a90f4130595708b74304f1943f4118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009051860" comment="kdegraphics3-devel less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051867" comment="kdegraphics3-extra less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051862" comment="kdegraphics3-kamera less than 3.5.1-23.24"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009051865" comment="kdegraphics3-scan less than 3.5.1-23.24"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1189</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-1189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1189" source="CVE"/>
	<description>
	The _dbus_validate_signature_with_reason function (dbus-marshal-validate.c) in D-Bus (aka DBus) before 1.2.14 uses incorrect logic to validate a basic type, which allows remote attackers to spoof a signature via a crafted key.  NOTE: this is due to an incorrect fix for CVE-2008-3834.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- c666fe3b8224eb67e03aff3ec8053e7b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068048" comment="dbus-1-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068051" comment="dbus-1-glib-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068052" comment="dbus-1-glib-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068059" comment="dbus-1-qt3-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068061" comment="dbus-1-qt3-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068064" comment="dbus-1-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068066" comment="dbus-1-devel-doc less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
			</criteria>
		</criteria></criteria>
	<!-- dde20c718132c54e40619cef79c34890 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068048" comment="dbus-1-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068051" comment="dbus-1-glib-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068052" comment="dbus-1-glib-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068059" comment="dbus-1-qt3-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068061" comment="dbus-1-qt3-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068064" comment="dbus-1-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068066" comment="dbus-1-devel-doc less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1192</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1192" source="CVE"/>
	<description>
	The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2cf3d40457c9435953c26b8e74c24432 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056151" comment="kernel-iseries64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056153" comment="kernel-ppc64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 4d39ec6d8748e038ab04a0b27f7382a1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056156" comment="kernel-bigsmp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056161" comment="kernel-kdumppae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056162" comment="kernel-vmi less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056163" comment="kernel-vmipae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5fb2b55e46097825cba505848cb839cb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- b7e0a3a4762fed8e2796b6c6a47318da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
		</criteria>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- ddf0cfe0200a78301be8b1d7b78fb645 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1194</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1194" source="CVE"/>
	<description>
	Integer overflow in the pango_glyph_string_set_size function in pango/glyphstring.c in Pango before 1.24 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long glyph string that triggers a heap-based buffer overflow, as demonstrated by a long document.location value in Firefox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1fd6ca9e4e40b511e5aab13a88cbcfec -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063814" comment="firefox3-pango-32bit less than 1.14.5-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063815" comment="firefox3-pango less than 1.14.5-0.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063816" comment="firefox3-pango-devel less than 1.14.5-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063817" comment="firefox3-pango-doc less than 1.14.5-0.10.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5b743680a16122344c885a01b3f42907 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057924" comment="pango-32bit less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057925" comment="pango-devel less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057926" comment="pango-doc less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057927" comment="pango less than 1.10.2-23.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057929" comment="pango-devel-64bit less than 1.10.2-23.8.1"/>
		</criteria></criteria>
	<!-- 7209e77048416ee8624b1ffd95e19987 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057924" comment="pango-32bit less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057928" comment="pango-64bit less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057929" comment="pango-devel-64bit less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057925" comment="pango-devel less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057926" comment="pango-doc less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057930" comment="pango-x86 less than 1.10.2-23.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057927" comment="pango less than 1.10.2-23.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057929" comment="pango-devel-64bit less than 1.10.2-23.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1195</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1195" source="CVE"/>
	<description>
	The Apache HTTP Server 2.2.11 and earlier 2.2 versions does not properly handle Options=IncludesNOEXEC in the AllowOverride directive, which allows local users to gain privileges by configuring (1) Options Includes, (2) Options +Includes, or (3) Options +IncludesNOEXEC in a .htaccess file, and then inserting an exec element in a .shtml file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de2d508793de8ff7df41d3b20495e54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055745" comment="apache2-devel less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055746" comment="apache2-doc less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055747" comment="apache2-example-pages less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055748" comment="apache2-prefork less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055749" comment="apache2-worker less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055750" comment="apache2 less than 2.2.3-16.28.1"/>
		</criteria>
	</criteria>
	<!-- d5b711121aff7f0480198634eaa0003e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055752" comment="apache2-devel less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055753" comment="apache2-doc less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055754" comment="apache2-example-pages less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055755" comment="apache2-prefork less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055756" comment="apache2-worker less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055757" comment="apache2 less than 2.2.3-16.25.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1210</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1210" source="CVE"/>
	<description>
	Format string vulnerability in the PROFINET/DCP (PN-DCP) dissector in Wireshark 1.0.6 and earlier allows remote attackers to execute arbitrary code via a PN-DCP packet with format string specifiers in the station name.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 92f576c096d077da0805e0dc494468cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052781" comment="ethereal-devel less than 0.10.14-16.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1241</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1241" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1241" source="CVE"/>
	<description>
	Unspecified vulnerability in ClamAV before 0.95 allows remote attackers to bypass detection of malware via a modified RAR archive.
	</description>
 </metadata>
<!-- 0524ba35285ff647ef90b465f5230068 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051619" comment="clamav less than 0.95-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1252</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252" source="CVE"/>
	<description>
	Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
	</description>
 </metadata>
<!-- 7ea5df6aa6b065af0491ec2578421b95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051869" comment="xntp-doc less than 4.2.4p3-48.13.3"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1265</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1265" source="CVE"/>
	<description>
	Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1266</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1266" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark before 1.0.7 has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- 92f576c096d077da0805e0dc494468cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052781" comment="ethereal-devel less than 0.10.14-16.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1267</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1267" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1267" source="CVE"/>
	<description>
	Unspecified vulnerability in the LDAP dissector in Wireshark 0.99.2 through 1.0.6, when running on Windows, allows remote attackers to cause a denial of service (crash) via unknown attack vectors.
	</description>
 </metadata>
<!-- 92f576c096d077da0805e0dc494468cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052781" comment="ethereal-devel less than 0.10.14-16.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1268</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1268" source="CVE"/>
	<description>
	The Check Point High-Availability Protocol (CPHAP) dissector in Wireshark 0.9.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted FWHA_MY_STATE packet.
	</description>
 </metadata>
<!-- 92f576c096d077da0805e0dc494468cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052781" comment="ethereal-devel less than 0.10.14-16.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1269</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1269" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1269" source="CVE"/>
	<description>
	Unspecified vulnerability in Wireshark 0.99.6 through 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted Tektronix .rf5 file.
	</description>
 </metadata>
<!-- 92f576c096d077da0805e0dc494468cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052781" comment="ethereal-devel less than 0.10.14-16.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1270</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1270" source="CVE"/>
	<description>
	libclamav/untar.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (infinite loop) via a crafted TAR file that causes (1) clamd and (2) clamscan to hang.
	</description>
 </metadata>
<!-- 0524ba35285ff647ef90b465f5230068 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009051619" comment="clamav less than 0.95-0.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1271</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1271" source="CVE"/>
	<description>
	The JSON_parser function (ext/json/JSON_parser.c) in PHP 5.2.x before 5.2.9 allows remote attackers to cause a denial of service (segmentation fault) via a malformed string to the json_decode API function.
	</description>
 </metadata>
<!-- a84d2b07b65a5277099136e0e95c6a13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053095" comment="apache2-mod_php5 less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053096" comment="php5-bcmath less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053097" comment="php5-bz2 less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053098" comment="php5-calendar less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053099" comment="php5-ctype less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053100" comment="php5-curl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053101" comment="php5-dba less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053102" comment="php5-dbase less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053103" comment="php5-devel less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053104" comment="php5-dom less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053105" comment="php5-exif less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053106" comment="php5-fastcgi less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053107" comment="php5-ftp less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053108" comment="php5-gd less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053109" comment="php5-gettext less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053110" comment="php5-gmp less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053111" comment="php5-iconv less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053112" comment="php5-imap less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053114" comment="php5-ldap less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053115" comment="php5-mbstring less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053116" comment="php5-mcrypt less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053117" comment="php5-mhash less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053118" comment="php5-mysql less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053119" comment="php5-ncurses less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053120" comment="php5-odbc less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053121" comment="php5-openssl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053122" comment="php5-pcntl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053123" comment="php5-pdo less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053124" comment="php5-pear less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053125" comment="php5-pgsql less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053126" comment="php5-posix less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053127" comment="php5-pspell less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053128" comment="php5-shmop less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053129" comment="php5-snmp less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053130" comment="php5-soap less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053131" comment="php5-sockets less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053132" comment="php5-sqlite less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053133" comment="php5-suhosin less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053134" comment="php5-sysvmsg less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053135" comment="php5-sysvsem less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053136" comment="php5-sysvshm less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053143" comment="php5-tidy less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053137" comment="php5-tokenizer less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053138" comment="php5-wddx less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053139" comment="php5-xmlreader less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053140" comment="php5-xmlrpc less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053141" comment="php5-xsl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053142" comment="php5-zlib less than 5.2.5-9.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1272</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1272" source="CVE"/>
	<description>
	The php_zip_make_relative_path function in php_zip.c in PHP 5.2.x before 5.2.9 allows context-dependent attackers to cause a denial of service (crash) via a ZIP file that contains filenames with relative paths, which is not properly handled during extraction.
	</description>
 </metadata>
<!-- a84d2b07b65a5277099136e0e95c6a13 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053095" comment="apache2-mod_php5 less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053096" comment="php5-bcmath less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053097" comment="php5-bz2 less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053098" comment="php5-calendar less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053099" comment="php5-ctype less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053100" comment="php5-curl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053101" comment="php5-dba less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053102" comment="php5-dbase less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053103" comment="php5-devel less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053104" comment="php5-dom less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053105" comment="php5-exif less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053106" comment="php5-fastcgi less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053107" comment="php5-ftp less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053108" comment="php5-gd less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053109" comment="php5-gettext less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053110" comment="php5-gmp less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053111" comment="php5-iconv less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053112" comment="php5-imap less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053114" comment="php5-ldap less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053115" comment="php5-mbstring less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053116" comment="php5-mcrypt less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053117" comment="php5-mhash less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053118" comment="php5-mysql less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053119" comment="php5-ncurses less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053120" comment="php5-odbc less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053121" comment="php5-openssl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053122" comment="php5-pcntl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053123" comment="php5-pdo less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053124" comment="php5-pear less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053125" comment="php5-pgsql less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053126" comment="php5-posix less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053127" comment="php5-pspell less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053128" comment="php5-shmop less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053129" comment="php5-snmp less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053130" comment="php5-soap less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053131" comment="php5-sockets less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053132" comment="php5-sqlite less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053133" comment="php5-suhosin less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053134" comment="php5-sysvmsg less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053135" comment="php5-sysvsem less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053136" comment="php5-sysvshm less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053143" comment="php5-tidy less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053137" comment="php5-tokenizer less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053138" comment="php5-wddx less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053139" comment="php5-xmlreader less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053140" comment="php5-xmlrpc less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053141" comment="php5-xsl less than 5.2.5-9.18"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053142" comment="php5-zlib less than 5.2.5-9.18"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1274</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1274" source="CVE"/>
	<description>
	Integer overflow in the qt_error parse_trak_atom function in demuxers/demux_qt.c in xine-lib 1.1.16.2 and earlier allows remote attackers to execute arbitrary code via a Quicktime movie file with a large count value in an STTS atom, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ee2f038888995e179776697395cd9508 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052802" comment="xine-devel less than 1.1.1-24.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052805" comment="xine-extra less than 1.1.1-24.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052803" comment="xine-lib-32bit less than 1.1.1-24.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052806" comment="xine-lib-64bit less than 1.1.1-24.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052807" comment="xine-lib-x86 less than 1.1.1-24.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052804" comment="xine-lib less than 1.1.1-24.48"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052808" comment="xine-ui less than 0.99.4-32.44"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1297</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1297" source="CVE"/>
	<description>
	iscsi_discovery in open-iscsi in SUSE openSUSE 10.3 through 11.1 and SUSE Linux Enterprise (SLE) 10 SP2 and 11, and other operating systems, allows local users to overwrite arbitrary files via a symlink attack on an unspecified temporary file that has a predictable name.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- c62c9c8d7403ed188906988710899397 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054851" comment="open-iscsi less than 2.0.707-0.47"/>
	</criteria>
	<!-- d9bebd3b16363659a53c892822262d1d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054851" comment="open-iscsi less than 2.0.707-0.47"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1337</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1337" source="CVE"/>
	<description>
	The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1341</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1341" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1341" source="CVE"/>
	<description>
	Memory leak in the dequote_bytea function in quote.c in the DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.0.0 for Perl allows context-dependent attackers to cause a denial of service (memory consumption) by fetching data with BYTEA columns.
	</description>
 </metadata>
<!-- 28003a67cf12bd4b94228157411ca13c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052306" comment="perl-DBD-Pg less than 1.43-13.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1364</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1364" source="CVE"/>
	<description>
	Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.
	</description>
 </metadata>
<!-- e01d37f9647a898cdefc41fa620aa018 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052854" comment="libwmf-devel less than 0.2.8.2-110.10"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052855" comment="libwmf less than 0.2.8.2-110.10"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1373</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1373" source="CVE"/>
	<description>
	Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin (formerly Gaim) before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- dbfedf4e20b8e167936f71460bc95188 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053503" comment="finch-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053500" comment="finch less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053504" comment="libpurple-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053501" comment="libpurple less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053505" comment="pidgin-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053502" comment="pidgin less than 2.3.1-10.15"/>
		</criteria>
	</criteria>
	<!-- e3e23f3e7f566f0085378b24a380cbb9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053506" comment="gaim-devel less than 1.5.0-50.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053507" comment="gaim less than 1.5.0-50.34"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1375</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1375" source="CVE"/>
	<description>
	The PurpleCircBuffer implementation in Pidgin (formerly Gaim) before 2.5.6 does not properly maintain a certain buffer, which allows remote attackers to cause a denial of service (memory corruption and application crash) via vectors involving the (1) XMPP or (2) Sametime protocol.
	</description>
 </metadata>
<!-- dbfedf4e20b8e167936f71460bc95188 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053503" comment="finch-devel less than 2.3.1-10.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053500" comment="finch less than 2.3.1-10.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053504" comment="libpurple-devel less than 2.3.1-10.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053501" comment="libpurple less than 2.3.1-10.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053505" comment="pidgin-devel less than 2.3.1-10.15"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053502" comment="pidgin less than 2.3.1-10.15"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1376</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1376" source="CVE"/>
	<description>
	Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin (formerly Gaim) before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows.  NOTE: this issue exists because of an incomplete fix for CVE-2008-2927.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- dbfedf4e20b8e167936f71460bc95188 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053503" comment="finch-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053500" comment="finch less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053504" comment="libpurple-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053501" comment="libpurple less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053505" comment="pidgin-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053502" comment="pidgin less than 2.3.1-10.15"/>
		</criteria>
	</criteria>
	<!-- e3e23f3e7f566f0085378b24a380cbb9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053506" comment="gaim-devel less than 1.5.0-50.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053507" comment="gaim less than 1.5.0-50.34"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1377</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1377" source="CVE"/>
	<description>
	The dtls1_buffer_record function in ssl/d1_pkt.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allows remote attackers to cause a denial of service (memory consumption) via a large series of "future epoch" DTLS records that are buffered in a queue, aka "DTLS record buffer limitation bug."
	</description>
 </metadata>
<!-- b65a9f9c0e5485bb16d54ee357b21e83 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052864" comment="openssl-doc less than 0.9.8a-18.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1378</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1378" source="CVE"/>
	<description>
	Multiple memory leaks in the dtls1_process_out_of_seq_message function in ssl/d1_both.c in OpenSSL 0.9.8k and earlier 0.9.8 versions allow remote attackers to cause a denial of service (memory consumption) via DTLS records that (1) are duplicates or (2) have sequence numbers much greater than current sequence numbers, aka "DTLS fragment handling memory leak."
	</description>
 </metadata>
<!-- b65a9f9c0e5485bb16d54ee357b21e83 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052864" comment="openssl-doc less than 0.9.8a-18.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1379</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1379" source="CVE"/>
	<description>
	Use-after-free vulnerability in the dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL 1.0.0 Beta 2 allows remote attackers to cause a denial of service (openssl s_client crash) and possibly have unspecified other impact via a DTLS packet, as demonstrated by a packet from a server that uses a crafted server certificate.
	</description>
 </metadata>
<!-- b65a9f9c0e5485bb16d54ee357b21e83 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052864" comment="openssl-doc less than 0.9.8a-18.32"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1386</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1386" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1386" source="CVE"/>
	<description>
	ssl/s3_pkt.c in OpenSSL before 0.9.8i allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a DTLS ChangeCipherSpec packet that occurs before ClientHello.
	</description>
 </metadata>
<!-- 4ae4739eec6ac806d39027fb567cc47d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052888" comment="openssl-doc less than 0.9.8a-18.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1387</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1387" source="CVE"/>
	<description>
	The dtls1_retrieve_buffered_fragment function in ssl/d1_both.c in OpenSSL before 1.0.0 Beta 2 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an out-of-sequence DTLS handshake message, related to a "fragment bug."
	</description>
 </metadata>
<!-- 4ae4739eec6ac806d39027fb567cc47d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052888" comment="openssl-doc less than 0.9.8a-18.34"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1389</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1389" source="CVE"/>
	<description>
	Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1488b2feebe11fa2560e9572ac5df8b9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054191" comment="kernel-xenpae less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- 5e81623d966649d62e406c2b190b0989 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
	</criteria>
	<!-- 7a7a8f331b9706799e3c3bce839e8aa0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- b1474c57d5b92c106f1c8e12e5868694 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1439</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1439" source="CVE"/>
	<description>
	Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1563" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2009-0689.  Reason: This candidate is a duplicate of CVE-2009-0689.  Certain codebase relationships were not originally clear.  Notes: All CVE users should reference CVE-2009-0689 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dd29bade9f7bbb05007b9a7cd8d845db -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056070" comment="mozilla-nspr-32bit less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056073" comment="mozilla-nspr-64bit less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056071" comment="mozilla-nspr-devel less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056074" comment="mozilla-nspr-x86 less than 4.8.2-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056072" comment="mozilla-nspr less than 4.8.2-1.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1570</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1570" source="CVE"/>
	<description>
	Integer overflow in the ReadImage function in plug-ins/file-bmp/bmp-read.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a BMP file with crafted width and height values that trigger a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 81784b1af32c10a70030409d240c5d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059677" comment="gimp less than 2.2.10-22.33.1"/>
	</criteria>
	<!-- 8898f86dd0b585356643c2317b17508f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059678" comment="gimp-devel less than 2.2.10-22.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059679" comment="gimp-devel less than 2.2.10-22.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059680" comment="gimp less than 2.2.10-22.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059677" comment="gimp less than 2.2.10-22.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1571</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1571" source="CVE"/>
	<description>
	Use-after-free vulnerability in the HTML parser in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to execute arbitrary code via unspecified method calls that attempt to access freed objects in low-memory situations.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2755cbbc26038704cb28fe5609654649 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 630708f048967bcbe3d7e12e91204fcf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 92493341108c831de901f98149d82c69 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058440" comment="MozillaFirefox-translations less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058441" comment="MozillaFirefox less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058448" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d41075930b3e4dc43019336480f6a248 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058453" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1572</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1572" source="CVE"/>
	<description>
	The BGP daemon (bgpd) in Quagga 0.99.11 and earlier allows remote attackers to cause a denial of service (crash) via an AS path containing ASN elements whose string representation is longer than expected, which triggers an assert error.
	</description>
 </metadata>
<!-- 106333254b92cd375d0b8859132f4a07 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052942" comment="quagga-devel less than 0.99.9-14.5"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052943" comment="quagga less than 0.99.9-14.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1574</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1574" source="CVE"/>
	<description>
	racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafted fragmented packets without a payload, which triggers a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d21777e21f3ff74cefdd00b74fcd88f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052953" comment="novell-ipsec-tools-devel less than 0.6.3-26.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052952" comment="novell-ipsec-tools less than 0.6.3-26.26"/>
		</criteria>
	</criteria>
	<!-- ba132586a7f185687c713ecb8353e759 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052956" comment="ipsec-tools less than 0.6.5-10.13"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1630</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1630" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1630" source="CVE"/>
	<description>
	The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and earlier, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execute files, as demonstrated by files on an NFSv4 fileserver.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1488b2feebe11fa2560e9572ac5df8b9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054191" comment="kernel-xenpae less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- 5e81623d966649d62e406c2b190b0989 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
	</criteria>
	<!-- 7a7a8f331b9706799e3c3bce839e8aa0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- b1474c57d5b92c106f1c8e12e5868694 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
	</criteria>
	<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1631</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1631" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1631" source="CVE"/>
	<description>
	The Mailer component in Evolution 2.26.1 and earlier uses world-readable permissions for the .evolution directory, and certain directories and files under .evolution/ related to local mail, which allows local users to obtain sensitive information by reading these files.
	</description>
 </metadata>
<!-- ce348cdfb35e252764bfbecf9d58b216 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060320" comment="evolution-data-server-32bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060323" comment="evolution-data-server-64bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060321" comment="evolution-data-server-devel less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060324" comment="evolution-data-server-x86 less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060322" comment="evolution-data-server less than 1.6.0-43.92.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060320" comment="evolution-data-server-32bit less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060321" comment="evolution-data-server-devel less than 1.6.0-43.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060322" comment="evolution-data-server less than 1.6.0-43.92.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1632</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1632" source="CVE"/>
	<description>
	Multiple memory leaks in Ipsec-tools before 0.7.2 allow remote attackers to cause a denial of service (memory consumption) via vectors involving (1) signature verification during user authentication with X.509 certificates, related to the eay_check_x509sign function in src/racoon/crypto_openssl.c; and (2) the NAT-Traversal (aka NAT-T) keepalive implementation, related to src/racoon/nattraversal.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d21777e21f3ff74cefdd00b74fcd88f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052953" comment="novell-ipsec-tools-devel less than 0.6.3-26.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052952" comment="novell-ipsec-tools less than 0.6.3-26.26"/>
		</criteria>
	</criteria>
	<!-- ba132586a7f185687c713ecb8353e759 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052956" comment="ipsec-tools less than 0.6.5-10.13"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091633" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1633</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1633" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1633" source="CVE"/>
	<description>
	Multiple buffer overflows in the cifs subsystem in the Linux kernel before 2.6.29.4 allow remote CIFS servers to cause a denial of service (memory corruption) and possibly have unspecified other impact via (1) a malformed Unicode string, related to Unicode string area alignment in fs/cifs/sess.c; or (2) long Unicode characters, related to fs/cifs/cifssmb.c and the cifs_readdir function in fs/cifs/readdir.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 4dfac144676df4f2b5aa5031accd9b6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- 9775d38cea566d73fa029239a914a5b7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
	</criteria>
	<!-- ae34197f7a01df2900bcf50d77b9b261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b188d90943ea173782dd6e41e9050957 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009052444" comment="kernel-debug less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052440" comment="kernel-kdump less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052446" comment="kernel-xen less than 2.6.16.60-0.39.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009052448" comment="kernel-xenpae less than 2.6.16.60-0.39.3"/>
		</criteria>
	</criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- f6add693b5600819c3aa104296b604e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055821" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.26-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055822" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.26-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055823" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.26-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055824" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.26-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055825" comment="kernel-rt less than 2.6.22.19-0.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055826" comment="kernel-rt_bigsmp less than 2.6.22.19-0.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055827" comment="kernel-rt_debug less than 2.6.22.19-0.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055828" comment="kernel-rt_timing less than 2.6.22.19-0.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055829" comment="kernel-source less than 2.6.22.19-0.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055830" comment="kernel-syms less than 2.6.22.19-0.26"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055831" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.26-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055832" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.26-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055833" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.26-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055834" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.26-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055835" comment="ofed-doc less than 1.3-0.33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055836" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.26-0.33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055837" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.26-0.33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055838" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.26-0.33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055839" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.26-0.33.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055840" comment="ofed less than 1.3-0.33.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1709</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1709" source="CVE"/>
	<description>
	Use-after-free vulnerability in the garbage-collection implementation in WebCore in WebKit in Apple Safari before 4.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap corruption and application crash) via an SVG animation element, related to SVG set objects, SVG marker elements, the targetElement attribute, and unspecified "caches."
	</description>
 </metadata>
<!-- e3ee5f3465bf28ff10fa73651f8a68a3 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064973" comment="kdegraphics3-fax less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064975" comment="kdegraphics3-pdf less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064976" comment="kdegraphics3-postscript less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064978" comment="kdegraphics3 less than 3.5.1-23.30.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064974" comment="kdegraphics3-kamera less than 3.5.1-23.30.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064977" comment="kdegraphics3-scan less than 3.5.1-23.30.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1720</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1720" source="CVE"/>
	<description>
	Multiple integer overflows in OpenEXR 1.2.2 and 1.6.1 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unspecified vectors that trigger heap-based buffer overflows, related to (1) the Imf::PreviewImage::PreviewImage function and (2) compressor constructors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- c304c5623e630e59c0dd1da0d3dd4ead -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054518" comment="OpenEXR-devel less than 1.2.2-16.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1721</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1721" source="CVE"/>
	<description>
	The decompression implementation in the Imf::hufUncompress function in OpenEXR 1.2.2 and 1.6.1 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a free of an uninitialized pointer.
	</description>
 </metadata>
<!-- c304c5623e630e59c0dd1da0d3dd4ead -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054518" comment="OpenEXR-devel less than 1.2.2-16.7"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1725</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1725" source="CVE"/>
	<description>
	WebKit in Apple Safari before 4.0.2, as used on iPhone OS before 3.1, iPhone OS before 3.1.1 for iPod touch, and other platforms; KHTML in kdelibs in KDE; QtWebKit (aka Qt toolkit); and possibly other products do not properly handle numeric character references, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted HTML document.
	</description>
 </metadata>
<!-- c5b30cec13efad0da65c9a7a3126e989 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064930" comment="kdelibs3-32bit less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064936" comment="kdelibs3-64bit less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064931" comment="kdelibs3-arts-32bit less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064937" comment="kdelibs3-arts-64bit less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064938" comment="kdelibs3-arts-x86 less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064932" comment="kdelibs3-arts less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064933" comment="kdelibs3-devel less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064934" comment="kdelibs3-doc less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064939" comment="kdelibs3-x86 less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064935" comment="kdelibs3 less than 3.5.1-49.55.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064930" comment="kdelibs3-32bit less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064931" comment="kdelibs3-arts-32bit less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064932" comment="kdelibs3-arts less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064933" comment="kdelibs3-devel less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064934" comment="kdelibs3-doc less than 3.5.1-49.55.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064935" comment="kdelibs3 less than 3.5.1-49.55.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064933" comment="kdelibs3-devel less than 3.5.1-49.55.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1758</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1758" source="CVE"/>
	<description>
	The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "certain address ranges."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1488b2feebe11fa2560e9572ac5df8b9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054191" comment="kernel-xenpae less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- 5e81623d966649d62e406c2b190b0989 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
	</criteria>
	<!-- 7a7a8f331b9706799e3c3bce839e8aa0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- b1474c57d5b92c106f1c8e12e5868694 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1829</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1829" source="CVE"/>
	<description>
	Unspecified vulnerability in the PCNFSD dissector in Wireshark 0.8.20 through 1.0.7 allows remote attackers to cause a denial of service (crash) via crafted PCNFSD packets.
	</description>
 </metadata>
<!-- 92f576c096d077da0805e0dc494468cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052781" comment="ethereal-devel less than 0.10.14-16.35"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1882</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1882" source="CVE"/>
	<description>
	Integer overflow in the XMakeImage function in magick/xwindow.c in ImageMagick 6.5.2-8, and GraphicsMagick, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF file, which triggers a buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 4d486a04603cac61405274c0451c097d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009052999" comment="ImageMagick-Magick++-devel less than 6.2.5-16.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052995" comment="ImageMagick-Magick++ less than 6.2.5-16.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052996" comment="ImageMagick-devel less than 6.2.5-16.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052997" comment="ImageMagick less than 6.2.5-16.31"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009052998" comment="perl-PerlMagick less than 6.2.5-16.31"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1885</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1885" source="CVE"/>
	<description>
	Stack consumption vulnerability in validators/DTD/DTDScanner.cpp in Apache Xerces C++ 2.7.0 and 2.8.0 allows context-dependent attackers to cause a denial of service (application crash) via vectors involving nested parentheses and invalid byte values in "simply nested DTD structures," as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- dcb34098c11b2752fbf5c9d6239eec51 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054078" comment="Xerces-c-devel less than 2.7.0-13.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054079" comment="Xerces-c less than 2.7.0-13.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1886</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1886" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in client/client.c in smbclient in Samba 3.2.0 through 3.2.12 might allow context-dependent attackers to execute arbitrary code via format string specifiers in a filename.
	</description>
 </metadata>
<!-- c07df0dd813417852d7df64e24cf909c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053339" comment="libmsrpc-devel less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053340" comment="libmsrpc less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053329" comment="libsmbclient-devel less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053350" comment="libsmbsharemodes-devel less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053351" comment="libsmbsharemodes less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053346" comment="samba-python less than 3.0.32-0.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1888</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1888" source="CVE"/>
	<description>
	The acl_group_override function in smbd/posix_acls.c in smbd in Samba 3.0.x before 3.0.35, 3.1.x and 3.2.x before 3.2.13, and 3.3.x before 3.3.6, when dos filemode is enabled, allows remote attackers to modify access control lists for files via vectors related to read access to uninitialized memory.
	</description>
 </metadata>
<!-- c07df0dd813417852d7df64e24cf909c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053339" comment="libmsrpc-devel less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053340" comment="libmsrpc less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053329" comment="libsmbclient-devel less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053350" comment="libsmbsharemodes-devel less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053351" comment="libsmbsharemodes less than 3.0.32-0.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053346" comment="samba-python less than 3.0.32-0.14"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1889</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1889" source="CVE"/>
	<description>
	The OSCAR protocol implementation in Pidgin before 2.5.8 misinterprets the ICQWebMessage message type as the ICQSMS message type, which allows remote attackers to cause a denial of service (application crash) via a crafted ICQ web message that triggers allocation of a large amount of memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- dbfedf4e20b8e167936f71460bc95188 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053503" comment="finch-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053500" comment="finch less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053504" comment="libpurple-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053501" comment="libpurple less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053505" comment="pidgin-devel less than 2.3.1-10.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053502" comment="pidgin less than 2.3.1-10.15"/>
		</criteria>
	</criteria>
	<!-- e3e23f3e7f566f0085378b24a380cbb9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053506" comment="gaim-devel less than 1.5.0-50.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053507" comment="gaim less than 1.5.0-50.34"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1890</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1890" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1890" source="CVE"/>
	<description>
	The stream_reqbody_cl function in mod_proxy_http.c in the mod_proxy module in the Apache HTTP Server before 2.3.3, when a reverse proxy is configured, does not properly handle an amount of streamed data that exceeds the Content-Length value, which allows remote attackers to cause a denial of service (CPU consumption) via crafted requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de2d508793de8ff7df41d3b20495e54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055745" comment="apache2-devel less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055746" comment="apache2-doc less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055747" comment="apache2-example-pages less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055748" comment="apache2-prefork less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055749" comment="apache2-worker less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055750" comment="apache2 less than 2.2.3-16.28.1"/>
		</criteria>
	</criteria>
	<!-- d5b711121aff7f0480198634eaa0003e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055752" comment="apache2-devel less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055753" comment="apache2-doc less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055754" comment="apache2-example-pages less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055755" comment="apache2-prefork less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055756" comment="apache2-worker less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055757" comment="apache2 less than 2.2.3-16.25.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1891</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-1891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1891" source="CVE"/>
	<description>
	The mod_deflate module in Apache httpd 2.2.11 and earlier compresses large files until completion even after the associated network connection is closed, which allows remote attackers to cause a denial of service (CPU consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de2d508793de8ff7df41d3b20495e54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055745" comment="apache2-devel less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055746" comment="apache2-doc less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055747" comment="apache2-example-pages less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055748" comment="apache2-prefork less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055749" comment="apache2-worker less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055750" comment="apache2 less than 2.2.3-16.28.1"/>
		</criteria>
	</criteria>
	<!-- d5b711121aff7f0480198634eaa0003e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055752" comment="apache2-devel less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055753" comment="apache2-doc less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055754" comment="apache2-example-pages less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055755" comment="apache2-prefork less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055756" comment="apache2-worker less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055757" comment="apache2 less than 2.2.3-16.25.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1904</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904" source="CVE"/>
	<description>
	The BigDecimal library in Ruby 1.8.6 before p369 and 1.8.7 before p173 allows context-dependent attackers to cause a denial of service (application crash) via a string argument that represents a large number, as demonstrated by an attempted conversion to the Float data type.
	</description>
 </metadata>
<!-- f817dc5d2977120cf83f7b87a7517497 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053214" comment="ruby-devel less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053215" comment="ruby-doc-html less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053216" comment="ruby-doc-ri less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053217" comment="ruby-examples less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053218" comment="ruby-test-suite less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053219" comment="ruby-tk less than 1.8.6.p369-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053213" comment="ruby less than 1.8.6.p369-0.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1932</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1932" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1932" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) user_info_callback, (2) user_endrow_callback, and (3) gst_pngdec_task functions (ext/libpng/gstpngdec.c) in GStreamer Good Plug-ins (aka gst-plugins-good or gstreamer-plugins-good) 0.10.15 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted PNG file, which triggers a buffer overflow.
	</description>
 </metadata>
<!-- 313871333a3983fd7a706e3be8153db7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053154" comment="gstreamer010-plugins-good-doc less than 0.10.2-16.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053155" comment="gstreamer010-plugins-good-extra less than 0.10.2-16.23"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1955</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1955" source="CVE"/>
	<description>
	The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564.
	</description>
 </metadata>
<!-- 6e86bacfc257d2963aaba9406ac8d6cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053413" comment="libapr-util1-devel-64bit less than 1.2.2-13.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053410" comment="libapr-util1-devel less than 1.2.2-13.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1956</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1956" source="CVE"/>
	<description>
	Off-by-one error in the apr_brigade_vprintf function in Apache APR-util before 1.3.5 on big-endian platforms allows remote attackers to obtain sensitive information or cause a denial of service (application crash) via crafted input.
	</description>
 </metadata>
<!-- 6e86bacfc257d2963aaba9406ac8d6cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053413" comment="libapr-util1-devel-64bit less than 1.2.2-13.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053410" comment="libapr-util1-devel less than 1.2.2-13.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20091961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-1961</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1961" source="CVE"/>
	<description>
	The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 2.6.27.24, 2.6.29 before 2.6.29.4, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of file creation and removal) via a series of splice system calls that trigger a deadlock between the generic_file_splice_write, splice_from_pipe, and ocfs2_file_splice_write functions.
	</description>
 </metadata>
<!-- b69b06ebe0eb0d8aaf0f9d075a74e1b6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053172" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053173" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053174" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053175" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.22-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053176" comment="kernel-rt less than 2.6.22.19-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053177" comment="kernel-rt_bigsmp less than 2.6.22.19-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053178" comment="kernel-rt_debug less than 2.6.22.19-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053179" comment="kernel-rt_timing less than 2.6.22.19-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053180" comment="kernel-source less than 2.6.22.19-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053181" comment="kernel-syms less than 2.6.22.19-0.22"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053182" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.22-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053183" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053184" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053185" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053186" comment="ofed-doc less than 1.3-0.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053187" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.22-0.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053188" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.22-0.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053189" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.22-0.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053190" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.22-0.33.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053191" comment="ofed less than 1.3-0.33.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2139</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2139" source="CVE"/>
	<description>
	Heap-based buffer overflow in svtools/source/filter.vcl/wmf/enhwmf.cxx in Go-oo 2.x and 3.x before 3.0.1, previously named ooo-build and related to OpenOffice.org (OOo), allows remote attackers to execute arbitrary code via a crafted EMF file, a similar issue to CVE-2008-2238.
	</description>
 </metadata>
<!-- 2cfb18f7de248548d01ddd72c1aaa729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054600" comment="OpenOffice_org-cs less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054602" comment="OpenOffice_org-de less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054605" comment="OpenOffice_org-es less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054607" comment="OpenOffice_org-fr less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054608" comment="OpenOffice_org-galleries less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054609" comment="OpenOffice_org-gnome less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054612" comment="OpenOffice_org-hu less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054613" comment="OpenOffice_org-it less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054614" comment="OpenOffice_org-ja less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054615" comment="OpenOffice_org-kde less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054617" comment="OpenOffice_org-mono less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054622" comment="OpenOffice_org-pl less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054623" comment="OpenOffice_org-pt-BR less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054625" comment="OpenOffice_org-sk less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054628" comment="OpenOffice_org-zh-CN less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054629" comment="OpenOffice_org-zh-TW less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054631" comment="OpenOffice_org less than 3.1.1-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2140</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2140" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in cppcanvas/source/mtfrenderer/emfplus.cxx in Go-oo 2.x and 3.x before 3.0.1, previously named ooo-build and related to OpenOffice.org (OOo), allow remote attackers to execute arbitrary code via a crafted EMF+ file, a similar issue to CVE-2008-2238.
	</description>
 </metadata>
<!-- 2cfb18f7de248548d01ddd72c1aaa729 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054600" comment="OpenOffice_org-cs less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054602" comment="OpenOffice_org-de less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054605" comment="OpenOffice_org-es less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054607" comment="OpenOffice_org-fr less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054608" comment="OpenOffice_org-galleries less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054609" comment="OpenOffice_org-gnome less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054612" comment="OpenOffice_org-hu less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054613" comment="OpenOffice_org-it less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054614" comment="OpenOffice_org-ja less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054615" comment="OpenOffice_org-kde less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054617" comment="OpenOffice_org-mono less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054622" comment="OpenOffice_org-pl less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054623" comment="OpenOffice_org-pt-BR less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054625" comment="OpenOffice_org-sk less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054628" comment="OpenOffice_org-zh-CN less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054629" comment="OpenOffice_org-zh-TW less than 3.1.1-0.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054631" comment="OpenOffice_org less than 3.1.1-0.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2288</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2288" source="CVE"/>
	<description>
	statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
	</description>
 </metadata>
<!-- 2d9647e58ca6d4cfa21f85be5fb1175d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053674" comment="nagios-www less than 2.6-13.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053675" comment="nagios less than 2.6-13.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2347</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2347" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2347" source="CVE"/>
	<description>
	Multiple integer overflows in inter-color spaces conversion tools in libtiff 3.8 through 3.8.2, 3.9, and 4.0 allow context-dependent attackers to execute arbitrary code via a TIFF image with large (1) width and (2) height values, which triggers a heap-based buffer overflow in the (a) cvt_whole_image function in tiff2rgba and (b) tiffcvt function in rgb2ycbcr.
	</description>
 </metadata>
<!-- b8e25fbbba97f0bc29d9a4e1a7b67ad6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054100" comment="libtiff-devel-32bit less than 3.8.2-5.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054101" comment="libtiff-devel-64bit less than 3.8.2-5.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054097" comment="libtiff-devel less than 3.8.2-5.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2404</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2404" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2404" source="CVE"/>
	<description>
	Heap-based buffer overflow in a regular-expression parser in Mozilla Network Security Services (NSS) before 3.12.3, as used in Firefox, Thunderbird, SeaMonkey, Evolution, Pidgin, and AOL Instant Messenger (AIM), allows remote SSL servers to cause a denial of service (application crash) or possibly execute arbitrary code via a long domain name in the subject's Common Name (CN) field of an X.509 certificate, related to the cert_TestHostName function.
	</description>
 </metadata>
<!-- 570d4f21ee93a6599b1e2be44686741e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055356" comment="mozilla-nss-tools less than 3.12.3.1-1.4.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2406</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2406" source="CVE"/>
	<description>
	Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
	</description>
 </metadata>
<!-- 20ae4368743d981746247272670bfe1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054756" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054757" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054758" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054759" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054760" comment="kernel-rt less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054761" comment="kernel-rt_bigsmp less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054762" comment="kernel-rt_debug less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054763" comment="kernel-rt_timing less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054764" comment="kernel-source less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054765" comment="kernel-syms less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054766" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054767" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054768" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054769" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054770" comment="ofed-doc less than 1.3-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054771" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054772" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054773" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054774" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054775" comment="ofed less than 1.3-0.33.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2407</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2407" source="CVE"/>
	<description>
	Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
	</description>
 </metadata>
<!-- 20ae4368743d981746247272670bfe1b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054756" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054757" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054758" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054759" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054760" comment="kernel-rt less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054761" comment="kernel-rt_bigsmp less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054762" comment="kernel-rt_debug less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054763" comment="kernel-rt_timing less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054764" comment="kernel-source less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054765" comment="kernel-syms less than 2.6.22.19-0.23"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054766" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054767" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054768" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054769" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.23-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054770" comment="ofed-doc less than 1.3-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054771" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054772" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054773" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054774" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.23-0.33.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054775" comment="ofed less than 1.3-0.33.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2408</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2408" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.12.3, Firefox before 3.0.13, Thunderbird before 2.0.0.23, and SeaMonkey before 1.1.18 do not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority. NOTE: this was originally reported for Firefox before 3.5.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0084b01f47f800122a39b8f3c51dff94 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054938" comment="openldap2-back-meta less than 2.3.32-0.34.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054939" comment="openldap2-back-perl less than 2.3.32-0.34.2"/>
		</criteria>
	</criteria>
	<!-- 570d4f21ee93a6599b1e2be44686741e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055356" comment="mozilla-nss-tools less than 3.12.3.1-1.4.2"/>
	</criteria>
	<!-- 98c851b2207890cdc78a8457a78465b2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055932" comment="openldap2-back-meta less than 2.3.32-0.36.50"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055933" comment="openldap2-back-perl less than 2.3.32-0.36.50"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055927" comment="openldap2-client-32bit less than 2.3.32-0.36.91"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055934" comment="openldap2-client-64bit less than 2.3.32-0.36.91"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055935" comment="openldap2-client-x86 less than 2.3.32-0.36.91"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055928" comment="openldap2-client less than 2.3.32-0.36.91"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055929" comment="openldap2-devel-32bit less than 2.3.32-0.36.91"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055936" comment="openldap2-devel-64bit less than 2.3.32-0.36.91"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055930" comment="openldap2-devel less than 2.3.32-0.36.91"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055931" comment="openldap2 less than 2.3.32-0.36.50"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055932" comment="openldap2-back-meta less than 2.3.32-0.36.50"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055933" comment="openldap2-back-perl less than 2.3.32-0.36.50"/>
			</criteria>
		</criteria></criteria>
	<!-- 9c400659d0ad61b54865449b76c3d803 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055800" comment="neon-32bit less than 0.24.7-20.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055803" comment="neon-64bit less than 0.24.7-20.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055804" comment="neon-x86 less than 0.24.7-20.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055802" comment="neon less than 0.24.7-20.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055801" comment="neon-devel less than 0.24.7-20.8.1"/>
		</criteria></criteria>
	<!-- eaa0144c38b621123ffe7841bfd08604 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055801" comment="neon-devel less than 0.24.7-20.8.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2411</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2411" source="CVE"/>
	<description>
	Multiple integer overflows in the libsvn_delta library in Subversion before 1.5.7, and 1.6.x before 1.6.4, allow remote authenticated users and remote Subversion servers to execute arbitrary code via an svndiff stream with large windows that trigger a heap-based buffer overflow, a related issue to CVE-2009-2412.
	</description>
 </metadata>
<!-- ff783a5e3abc30e60baa263560acacc1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053851" comment="cvs2svn less than 1.3.0-30.14"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053849" comment="subversion-devel less than 1.3.1-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053852" comment="subversion-python less than 1.3.1-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053853" comment="subversion-server less than 1.3.1-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053854" comment="subversion-tools less than 1.3.1-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053850" comment="subversion less than 1.3.1-1.13"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053855" comment="viewcvs less than 1.0.5-0.5"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2412</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2412" source="CVE"/>
	<description>
	Multiple integer overflows in the Apache Portable Runtime (APR) library and the Apache Portable Utility library (aka APR-util) 0.9.x and 1.3.x allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger crafted calls to the (1) allocator_alloc or (2) apr_palloc function in memory/unix/apr_pools.c in APR; or crafted calls to the (3) apr_rmm_malloc, (4) apr_rmm_calloc, or (5) apr_rmm_realloc function in misc/apr_rmm.c in APR-util; leading to buffer overflows.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 756453d5faf1b9bc969224102bb99bd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055550" comment="libapr-util1-devel-64bit less than 1.2.2-13.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055545" comment="libapr-util1-devel less than 1.2.2-13.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055552" comment="libapr1-devel-64bit less than 1.2.2-13.8.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055547" comment="libapr1-devel less than 1.2.2-13.8.2"/>
		</criteria>
	</criteria>
	<!-- 7d5c42318fd9b8e7c53cb5cebad8bffa -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055557" comment="libapr-util1-64bit less than 1.2.2-13.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055558" comment="libapr-util1-devel-64bit less than 1.2.2-13.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055553" comment="libapr-util1-devel less than 1.2.2-13.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055554" comment="libapr-util1 less than 1.2.2-13.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055559" comment="libapr1-64bit less than 1.2.2-13.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055560" comment="libapr1-devel-64bit less than 1.2.2-13.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055555" comment="libapr1-devel less than 1.2.2-13.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055556" comment="libapr1 less than 1.2.2-13.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055558" comment="libapr-util1-devel-64bit less than 1.2.2-13.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055553" comment="libapr-util1-devel less than 1.2.2-13.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055560" comment="libapr1-devel-64bit less than 1.2.2-13.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055555" comment="libapr1-devel less than 1.2.2-13.8.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2414</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2414" source="CVE"/>
	<description>
	Stack consumption vulnerability in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allows context-dependent attackers to cause a denial of service (application crash) via a large depth of element declarations in a DTD, related to a function recursion, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- d1c0be7dff2b220aa560aad99d5f007a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054825" comment="libxml-32bit less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054827" comment="libxml-64bit less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054828" comment="libxml-devel less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054829" comment="libxml-x86 less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054826" comment="libxml less than 1.8.17-387.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2416</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2416" source="CVE"/>
	<description>
	Multiple use-after-free vulnerabilities in libxml2 2.5.10, 2.6.16, 2.6.26, 2.6.27, and 2.6.32, and libxml 1.8.17, allow context-dependent attackers to cause a denial of service (application crash) via crafted (1) Notation or (2) Enumeration attribute types in an XML file, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
<!-- d1c0be7dff2b220aa560aad99d5f007a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054825" comment="libxml-32bit less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054827" comment="libxml-64bit less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054828" comment="libxml-devel less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054829" comment="libxml-x86 less than 1.8.17-387.7"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054826" comment="libxml less than 1.8.17-387.7"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2417</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2417" source="CVE"/>
	<description>
	lib/ssluse.c in cURL and libcurl 7.4 through 7.19.5, when OpenSSL is used, does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 43b61c1f0bc310a34ea8af2c76d6d08c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053922" comment="curl-devel less than 7.15.1-19.14.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2446</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2446" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the dispatch_command function in libmysqld/sql_parse.cc in mysqld in MySQL 4.0.0 through 5.0.83 allow remote authenticated users to cause a denial of service (daemon crash) and possibly have unspecified other impact via format string specifiers in a database name in a (1) COM_CREATE_DB or (2) COM_DROP_DB request.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- cf52306cd57814ae2f1723f7a7eb2362 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054355" comment="mysql-Max less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054358" comment="mysql-bench less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054350" comment="mysql-client less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054351" comment="mysql-devel less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054352" comment="mysql-shared-32bit less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054356" comment="mysql-shared-64bit less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054357" comment="mysql-shared-x86 less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054353" comment="mysql-shared less than 5.0.26-12.24.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054354" comment="mysql less than 5.0.26-12.24.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2473</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2473" source="CVE"/>
	<description>
	neon before 0.28.6, when expat is used, does not properly detect recursion during entity expansion, which allows context-dependent attackers to cause a denial of service (memory and CPU consumption) via a crafted XML document containing a large number of nested entity references, a similar issue to CVE-2003-1564.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9c400659d0ad61b54865449b76c3d803 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055800" comment="neon-32bit less than 0.24.7-20.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055803" comment="neon-64bit less than 0.24.7-20.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055804" comment="neon-x86 less than 0.24.7-20.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055802" comment="neon less than 0.24.7-20.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055801" comment="neon-devel less than 0.24.7-20.8.1"/>
		</criteria></criteria>
	<!-- eaa0144c38b621123ffe7841bfd08604 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055801" comment="neon-devel less than 0.24.7-20.8.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2493</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2493" source="CVE"/>
	<description>
	The Active Template Library (ATL) in Microsoft Visual Studio .NET 2003 SP1, Visual Studio 2005 SP1 and 2008 Gold and SP1, and Visual C++ 2005 SP1 and 2008 Gold and SP1; and Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2; does not properly restrict use of OleLoadFromStream in instantiating objects from data streams, which allows remote attackers to execute arbitrary code via a crafted HTML document with an ATL (1) component or (2) control, related to ATL headers and bypassing security policies, aka "ATL COM Initialization Vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2560" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in Wireshark 1.2.0 allow remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace and is processed by the (1) Bluetooth L2CAP, (2) RADIUS, or (3) MIOP dissector. NOTE: it was later reported that the RADIUS issue also affects 0.10.13 through 1.0.9.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0417f6ab47e0cc6042fa19e603c81608 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056452" comment="ethereal less than 0.10.14-16.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
		</criteria></criteria>
	<!-- f47d07c215d229cde681685fa9a9e5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056459" comment="ethereal-devel less than 0.10.14-16.40.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2562</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2562" source="CVE"/>
	<description>
	Unspecified vulnerability in the AFS dissector in Wireshark 0.9.2 through 1.2.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
<!-- 8cb10a7a1ce1f911dc5c13487efae599 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054523" comment="ethereal-devel less than 0.10.14-16.37"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Infiniband dissector in Wireshark 1.0.6 through 1.2.0, when running on unspecified platforms, allows remote attackers to cause a denial of service (crash) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a7013413afe9902cca86ec3f1281b76e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058913" comment="ethereal less than 0.10.14-16.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
		</criteria></criteria>
	<!-- d3489af786e9a9c50fe6fe2a5f000813 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058915" comment="ethereal less than 0.10.14-16.40.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2621</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2621" source="CVE"/>
	<description>
	Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 does not properly enforce "buffer limits and related bound checks," which allows remote attackers to cause a denial of service via (1) an incomplete request or (2) a request with a large header size, related to (a) HttpMsg.cc and (b) client_side.cc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 886a2dff279c348e7a16ac2a73a99bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059072" comment="squid less than 2.5.STABLE12-18.13.982.2.2"/>
	</criteria>
	<!-- c47f23990313deda7c25045777a1d09b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059073" comment="squid less than 2.5.STABLE12-18.13.982.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2622</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2622" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2622" source="CVE"/>
	<description>
	Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 allows remote attackers to cause a denial of service via malformed requests including (1) "missing or mismatched protocol identifier," (2) missing or negative status value," (3) "missing version," or (4) "missing or invalid status number," related to (a) HttpMsg.cc and (b) HttpReply.cc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 886a2dff279c348e7a16ac2a73a99bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059072" comment="squid less than 2.5.STABLE12-18.13.982.2.2"/>
	</criteria>
	<!-- c47f23990313deda7c25045777a1d09b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059073" comment="squid less than 2.5.STABLE12-18.13.982.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2625</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2625" source="CVE"/>
	<description>
	XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02b44ddad8ad9e7b92ad9f13e92a601f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060286" comment="libicecore-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060281" comment="libicecore less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060287" comment="libiiclib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060282" comment="libiiclib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060288" comment="libiksemel-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060283" comment="libiksemel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060289" comment="libnetlib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060284" comment="libnetlib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060290" comment="libxmlrpc-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060285" comment="libxmlrpc less than 1.0.8-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 1600c350ed8256aad45f0e253962959b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054360" comment="xerces-j2-demo less than 2.7.1-16.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054361" comment="xerces-j2-javadoc-apis less than 2.7.1-16.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054362" comment="xerces-j2-javadoc-dom3 less than 2.7.1-16.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054363" comment="xerces-j2-javadoc-impl less than 2.7.1-16.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054364" comment="xerces-j2-javadoc-other less than 2.7.1-16.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054365" comment="xerces-j2-javadoc-xni less than 2.7.1-16.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054366" comment="xerces-j2-scripts less than 2.7.1-16.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054359" comment="xerces-j2 less than 2.7.1-16.7"/>
		</criteria>
	</criteria>
	<!-- 2bf3d4d93bd78d8c4ba85f2b470302a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060392" comment="python-32bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060399" comment="python-64bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060393" comment="python-curses less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060395" comment="python-gdbm less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060396" comment="python-tk less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060402" comment="python-x86 less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060397" comment="python-xml less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060398" comment="python less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060392" comment="python-32bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060393" comment="python-curses less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060395" comment="python-gdbm less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060396" comment="python-tk less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060397" comment="python-xml less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060398" comment="python less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 4b6a98144b056338e16faebd4e808fd6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060286" comment="libicecore-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060281" comment="libicecore less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060287" comment="libiiclib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060282" comment="libiiclib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060288" comment="libiksemel-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060283" comment="libiksemel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060289" comment="libnetlib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060284" comment="libnetlib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060290" comment="libxmlrpc-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060285" comment="libxmlrpc less than 1.0.8-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 82cdeeaf145bab6cfd200feb8ad71d89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055404" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055405" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055406" comment="java-1_4_2-ibm less than 1.4.2_sr13.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- fc01184d4545c6e564df463857033c91 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055113" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.1-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055114" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.1-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055115" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.1-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055116" comment="java-1_4_2-ibm less than 1.4.2_sr13.1-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2626</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2626" source="CVE"/>
	<description>
	The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2632</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2632" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2632" source="CVE"/>
	<description>
	Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error.
	</description>
 </metadata>
<!-- 7838d3a385c25e2d8cfd31f1f82533d2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009064564" comment="cyrus-imapd-devel less than 2.2.12-27.13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064565" comment="cyrus-imapd less than 2.2.12-27.13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064566" comment="perl-Cyrus-IMAP less than 2.2.12-27.13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064567" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.13.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2654</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2654" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page.
	</description>
 </metadata>
<!-- 25e7dd0fd151df757435e02aa7061252 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053995" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053996" comment="firefox3-atk-devel less than 1.12.3-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053997" comment="firefox3-atk-doc less than 1.12.3-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053998" comment="firefox3-cairo-devel less than 1.2.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053999" comment="firefox3-cairo-doc less than 1.2.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054000" comment="firefox3-glib2-devel less than 2.12.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054001" comment="firefox3-glib2-doc less than 2.12.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054002" comment="firefox3-gtk2-devel less than 2.10.6-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054003" comment="firefox3-gtk2-doc less than 2.10.6-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054004" comment="firefox3-pango-devel less than 1.14.5-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054005" comment="firefox3-pango-doc less than 1.14.5-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054006" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054007" comment="python-xpcom190 less than 1.9.0.13-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2661</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2661" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2661" source="CVE"/>
	<description>
	The asn1_length function in strongSwan 2.8 before 2.8.11, 4.2 before 4.2.17, and 4.3 before 4.3.3 does not properly handle X.509 certificates with crafted Relative Distinguished Names (RDNs), which allows remote attackers to cause a denial of service (pluto IKE daemon crash) via malformed ASN.1 data.  NOTE: this is due to an incomplete fix for CVE-2009-2185.
	</description>
 </metadata>
<!-- 4593f83fca2fada72ac76feb300268c6 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055868" comment="strongswan-doc less than 4.1.10-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055869" comment="strongswan less than 4.1.10-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2662</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2662" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2662" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.5.x before 3.5.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the TraceRecorder::snapshot function in js/src/jstracer.cpp, and unspecified other vectors.
	</description>
 </metadata>
<!-- 25e7dd0fd151df757435e02aa7061252 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053995" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053996" comment="firefox3-atk-devel less than 1.12.3-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053997" comment="firefox3-atk-doc less than 1.12.3-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053998" comment="firefox3-cairo-devel less than 1.2.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053999" comment="firefox3-cairo-doc less than 1.2.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054000" comment="firefox3-glib2-devel less than 2.12.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054001" comment="firefox3-glib2-doc less than 2.12.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054002" comment="firefox3-gtk2-devel less than 2.10.6-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054003" comment="firefox3-gtk2-doc less than 2.10.6-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054004" comment="firefox3-pango-devel less than 1.14.5-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054005" comment="firefox3-pango-doc less than 1.14.5-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054006" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054007" comment="python-xpcom190 less than 1.9.0.13-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2663</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2663" source="CVE"/>
	<description>
	libvorbis before r16182, as used in Mozilla Firefox 3.5.x before 3.5.2 and other products, allows context-dependent attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .ogg file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e7dd0fd151df757435e02aa7061252 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009053995" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053996" comment="firefox3-atk-devel less than 1.12.3-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053997" comment="firefox3-atk-doc less than 1.12.3-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053998" comment="firefox3-cairo-devel less than 1.2.4-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009053999" comment="firefox3-cairo-doc less than 1.2.4-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054000" comment="firefox3-glib2-devel less than 2.12.4-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054001" comment="firefox3-glib2-doc less than 2.12.4-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054002" comment="firefox3-gtk2-devel less than 2.10.6-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054003" comment="firefox3-gtk2-doc less than 2.10.6-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054004" comment="firefox3-pango-devel less than 1.14.5-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054005" comment="firefox3-pango-doc less than 1.14.5-0.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054006" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054007" comment="python-xpcom190 less than 1.9.0.13-1.4"/>
		</criteria>
	</criteria>
	<!-- 8ce1e2c2dcbbf5df8764b4d8f461c007 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061115" comment="libvorbis-32bit less than 1.1.2-13.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061117" comment="libvorbis-64bit less than 1.1.2-13.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061118" comment="libvorbis-x86 less than 1.1.2-13.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061116" comment="libvorbis less than 1.1.2-13.17.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061115" comment="libvorbis-32bit less than 1.1.2-13.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061116" comment="libvorbis less than 1.1.2-13.17.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2664</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2664" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2664" source="CVE"/>
	<description>
	The js_watch_set function in js/src/jsdbgapi.cpp in the JavaScript engine in Mozilla Firefox before 3.0.12 allows remote attackers to cause a denial of service (assertion failure and application exit) or possibly execute arbitrary code via a crafted .js file, related to a "memory safety bug." NOTE: this was originally reported as affecting versions before 3.0.13.
	</description>
 </metadata>
<!-- 25e7dd0fd151df757435e02aa7061252 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009053995" comment="MozillaFirefox-branding-upstream less than 3.0.13-0.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053996" comment="firefox3-atk-devel less than 1.12.3-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053997" comment="firefox3-atk-doc less than 1.12.3-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053998" comment="firefox3-cairo-devel less than 1.2.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053999" comment="firefox3-cairo-doc less than 1.2.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054000" comment="firefox3-glib2-devel less than 2.12.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054001" comment="firefox3-glib2-doc less than 2.12.4-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054002" comment="firefox3-gtk2-devel less than 2.10.6-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054003" comment="firefox3-gtk2-doc less than 2.10.6-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054004" comment="firefox3-pango-devel less than 1.14.5-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054005" comment="firefox3-pango-doc less than 1.14.5-0.4.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054006" comment="mozilla-xulrunner190-devel less than 1.9.0.13-1.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054007" comment="python-xpcom190 less than 1.9.0.13-1.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092666" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2666</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2666" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2666" source="CVE"/>
	<description>
	socket.c in fetchmail before 6.3.11 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- aa792942bdd01eea3a97fb1dfbccef98 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009053826" comment="fetchmailconf less than 6.3.2-15.16"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2687</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2687" source="CVE"/>
	<description>
	The exif_read_data function in the Exif module in PHP before 5.2.10 allows remote attackers to cause a denial of service (crash) via a malformed JPEG image with invalid offset fields, a different issue than CVE-2005-3353.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 54e1707c263932ac5174bd6b1c072016 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055242" comment="apache2-mod_php5 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055243" comment="php5-bcmath less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055244" comment="php5-bz2 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055245" comment="php5-calendar less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055246" comment="php5-ctype less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055247" comment="php5-curl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055248" comment="php5-dba less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055249" comment="php5-dbase less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055250" comment="php5-devel less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055251" comment="php5-dom less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055252" comment="php5-exif less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055253" comment="php5-fastcgi less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055254" comment="php5-ftp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055255" comment="php5-gd less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055256" comment="php5-gettext less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055257" comment="php5-gmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055258" comment="php5-iconv less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055259" comment="php5-imap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055261" comment="php5-ldap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055262" comment="php5-mbstring less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055263" comment="php5-mcrypt less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055264" comment="php5-mhash less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055265" comment="php5-mysql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055266" comment="php5-ncurses less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055267" comment="php5-odbc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055268" comment="php5-openssl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055269" comment="php5-pcntl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055270" comment="php5-pdo less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055271" comment="php5-pear less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055272" comment="php5-pgsql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055273" comment="php5-posix less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055274" comment="php5-pspell less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055275" comment="php5-shmop less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055276" comment="php5-snmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055277" comment="php5-soap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055278" comment="php5-sockets less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055279" comment="php5-sqlite less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055280" comment="php5-suhosin less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055281" comment="php5-sysvmsg less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055282" comment="php5-sysvsem less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055283" comment="php5-sysvshm less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055290" comment="php5-tidy less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055284" comment="php5-tokenizer less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055285" comment="php5-wddx less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055286" comment="php5-xmlreader less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055287" comment="php5-xmlrpc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055288" comment="php5-xsl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055289" comment="php5-zlib less than 5.2.5-9.22"/>
		</criteria>
	</criteria>
	<!-- d251a09fdb720a4a0919a0c5eddb9a7e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055988" comment="php5-json less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056018" comment="php5-tidy less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2688</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2688" source="CVE"/>
	<description>
	Multiple integer overflows in glyphs-eimage.c in XEmacs 21.4.22, when running on Windows, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) the tiff_instantiate function processing a crafted TIFF file, (2) the png_instantiate function processing a crafted PNG file, and (3) the jpeg_instantiate function processing a crafted JPEG file, all which trigger a heap-based buffer overflow.  NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
	</description>
 </metadata>
<!-- ba7fbcd50e80469ddd869dec93e6dbdf -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054273" comment="xemacs-el less than 21.5.25.20060327-7.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054271" comment="xemacs-info less than 21.5.25.20060327-7.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054272" comment="xemacs less than 21.5.25.20060327-7.8.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2692</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2692" source="CVE"/>
	<description>
	The Linux kernel 2.6.0 through 2.6.30.4, and 2.4.4 through 2.4.37.4, does not initialize all function pointers for socket operations in proto_ops structures, which allows local users to trigger a NULL pointer dereference and gain privileges by using mmap to map page zero, placing arbitrary code on this page, and then invoking an unavailable operation, as demonstrated by the sendpage operation (sock_sendpage function) on a PF_PPPOX socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1488b2feebe11fa2560e9572ac5df8b9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054191" comment="kernel-xenpae less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- 20ae4368743d981746247272670bfe1b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054756" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054757" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054758" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054759" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.23-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054760" comment="kernel-rt less than 2.6.22.19-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054761" comment="kernel-rt_bigsmp less than 2.6.22.19-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054762" comment="kernel-rt_debug less than 2.6.22.19-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054763" comment="kernel-rt_timing less than 2.6.22.19-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054764" comment="kernel-source less than 2.6.22.19-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054765" comment="kernel-syms less than 2.6.22.19-0.23"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054766" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.23-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054767" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.23-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054768" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.23-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054769" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.23-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054770" comment="ofed-doc less than 1.3-0.33.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054771" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.23-0.33.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054772" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.23-0.33.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054773" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.23-0.33.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054774" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.23-0.33.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054775" comment="ofed less than 1.3-0.33.2"/>
		</criteria>
	</criteria>
	<!-- 5e81623d966649d62e406c2b190b0989 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
	</criteria>
	<!-- 7a7a8f331b9706799e3c3bce839e8aa0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054192" comment="kernel-debug less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054190" comment="kernel-xen less than 2.6.16.60-0.42.4"/>
		</criteria>
	</criteria>
	<!-- b1474c57d5b92c106f1c8e12e5868694 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054193" comment="kernel-kdump less than 2.6.16.60-0.42.4"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2693</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2693" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) in an entry in a WAR file, as demonstrated by a ../../bin/catalina.bat entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b82096c2a3a7e9d5c2d4b75219cdb46 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059970" comment="tomcat5-admin-webapps less than 5.0.30-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059971" comment="tomcat5-webapps less than 5.0.30-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059972" comment="tomcat5 less than 5.0.30-27.45"/>
		</criteria>
	</criteria>
	<!-- 80929169daa1efe3e09dfd990377bfc6 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059325" comment="tomcat5-admin-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059326" comment="tomcat5-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059327" comment="tomcat5 less than 5.5.27-0.9.1"/>
		</criteria>
	</criteria>
	<!-- f4a91f888d8fc90949fa1c83eee4f030 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059336" comment="tomcat5-admin-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059337" comment="tomcat5-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059338" comment="tomcat5 less than 5.0.30-27.42"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2694</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2694" source="CVE"/>
	<description>
	The msn_slplink_process_msg function in libpurple/protocols/msn/slplink.c in libpurple, as used in Pidgin (formerly Gaim) before 2.5.9 and Adium 1.3.5 and earlier, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) by sending multiple crafted SLP (aka MSNSLP) messages to trigger an overwrite of an arbitrary memory location.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1376.
	</description>
 </metadata>
<!-- 7b67ab23355fa4943def20d1ff727b72 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009054492" comment="finch-devel less than 2.3.1-10.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054489" comment="finch less than 2.3.1-10.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054493" comment="libpurple-devel less than 2.3.1-10.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054490" comment="libpurple less than 2.3.1-10.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054494" comment="pidgin-devel less than 2.3.1-10.19"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009054491" comment="pidgin less than 2.3.1-10.19"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2698</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2698" source="CVE"/>
	<description>
	The udp_sendmsg function in the UDP implementation in (1) net/ipv4/udp.c and (2) net/ipv6/udp.c in the Linux kernel before 2.6.19 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) via vectors involving the MSG_MORE flag and a UDP socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a2950cb6b0b0a9aa147011687fdd8fdf -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054415" comment="kernel-debug less than 2.6.16.60-0.42.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054416" comment="kernel-kdump less than 2.6.16.60-0.42.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054414" comment="kernel-xen less than 2.6.16.60-0.42.5"/>
		</criteria>
	</criteria>
	<!-- bc784a44a781d3f28836d000eaea4def -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054416" comment="kernel-kdump less than 2.6.16.60-0.42.5"/>
	</criteria>
	<!-- bf857e9123b7b3c1789cc3e7d1780854 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009054415" comment="kernel-debug less than 2.6.16.60-0.42.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054416" comment="kernel-kdump less than 2.6.16.60-0.42.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054414" comment="kernel-xen less than 2.6.16.60-0.42.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054420" comment="kernel-xenpae less than 2.6.16.60-0.42.5"/>
		</criteria>
	</criteria>
	<!-- da43f9c6c2a8fe28a694a85f23a14f58 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009054415" comment="kernel-debug less than 2.6.16.60-0.42.5"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2700</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2700" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2700" source="CVE"/>
	<description>
	src/network/ssl/qsslcertificate.cpp in Nokia Trolltech Qt 4.x does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bcba4f2a8ad5c321b0e01e3ec52c8c68 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056192" comment="dbus-1-qt-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056200" comment="dbus-1-qt-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056201" comment="dbus-1-qt-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056193" comment="dbus-1-qt less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056194" comment="qt-qt3support-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056202" comment="qt-qt3support-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056203" comment="qt-qt3support-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056195" comment="qt-qt3support less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056196" comment="qt-sql-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056204" comment="qt-sql-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056205" comment="qt-sql-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056197" comment="qt-sql less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056198" comment="qt-x11-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056206" comment="qt-x11-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056207" comment="qt-x11-x86 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056199" comment="qt-x11 less than 4.3.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056208" comment="dbus-1-qt-devel less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056193" comment="dbus-1-qt less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056209" comment="qt-32bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056210" comment="qt-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056211" comment="qt-devel-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056212" comment="qt-devel-doc less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056202" comment="qt-qt3support-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056195" comment="qt-qt3support less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056204" comment="qt-sql-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056197" comment="qt-sql less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056206" comment="qt-x11-64bit less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056199" comment="qt-x11 less than 4.3.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056213" comment="qt-x86 less than 4.3.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c6c0d1b1fb33dc17f19047823a06cceb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056208" comment="dbus-1-qt-devel less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056193" comment="dbus-1-qt less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056209" comment="qt-32bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056210" comment="qt-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056211" comment="qt-devel-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056212" comment="qt-devel-doc less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056202" comment="qt-qt3support-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056195" comment="qt-qt3support less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056204" comment="qt-sql-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056197" comment="qt-sql less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056206" comment="qt-x11-64bit less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056199" comment="qt-x11 less than 4.3.4-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056213" comment="qt-x86 less than 4.3.4-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2813</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2813" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2813" source="CVE"/>
	<description>
	Samba 3.4 before 3.4.2, 3.3 before 3.3.8, 3.2 before 3.2.15, and 3.0.12 through 3.0.36, as used in the SMB subsystem in Apple Mac OS X 10.5.8 when Windows File Sharing is enabled, Fedora 11, and other operating systems, does not properly handle errors in resolving pathnames, which allows remote authenticated users to bypass intended sharing restrictions, and read, create, or modify files, in certain circumstances involving user accounts that lack home directories.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9f3b68ab973a8958802693988f631ec2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055591" comment="libmsrpc-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055592" comment="libmsrpc less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055581" comment="libsmbclient-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055602" comment="libsmbsharemodes-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055603" comment="libsmbsharemodes less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055598" comment="samba-python less than 3.0.32-0.16"/>
		</criteria>
	</criteria>
	<!-- dc4ae9dd35f01cf1f82feae5daa110f6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055614" comment="cifs-mount less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055615" comment="ldapsmb less than 1.34b-25.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055627" comment="libmsrpc-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055628" comment="libmsrpc less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055616" comment="libsmbclient-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055629" comment="libsmbclient-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055617" comment="libsmbclient-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055630" comment="libsmbclient-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055618" comment="libsmbclient less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055619" comment="samba-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055631" comment="samba-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055620" comment="samba-client-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055632" comment="samba-client-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055633" comment="samba-client-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055621" comment="samba-client less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055622" comment="samba-krb-printing less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055634" comment="samba-python less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055623" comment="samba-vscan less than 0.3.6b-43.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055624" comment="samba-winbind-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055635" comment="samba-winbind-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055636" comment="samba-winbind-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055625" comment="samba-winbind less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055637" comment="samba-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055626" comment="samba less than 3.0.36-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055627" comment="libmsrpc-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055628" comment="libmsrpc less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055617" comment="libsmbclient-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055758" comment="libsmbsharemodes-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055759" comment="libsmbsharemodes less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055634" comment="samba-python less than 3.0.36-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2848</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2848" source="CVE"/>
	<description>
	The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-&gt;clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2855</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2855" source="CVE"/>
	<description>
	The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 886a2dff279c348e7a16ac2a73a99bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059072" comment="squid less than 2.5.STABLE12-18.13.982.2.2"/>
	</criteria>
	<!-- c47f23990313deda7c25045777a1d09b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059073" comment="squid less than 2.5.STABLE12-18.13.982.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2901</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2901" source="CVE"/>
	<description>
	The autodeployment process in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20, when autoDeploy is enabled, deploys appBase files that remain from a failed undeploy, which might allow remote attackers to bypass intended authentication requirements via HTTP requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b82096c2a3a7e9d5c2d4b75219cdb46 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059970" comment="tomcat5-admin-webapps less than 5.0.30-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059971" comment="tomcat5-webapps less than 5.0.30-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059972" comment="tomcat5 less than 5.0.30-27.45"/>
		</criteria>
	</criteria>
	<!-- 80929169daa1efe3e09dfd990377bfc6 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059325" comment="tomcat5-admin-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059326" comment="tomcat5-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059327" comment="tomcat5 less than 5.5.27-0.9.1"/>
		</criteria>
	</criteria>
	<!-- f4a91f888d8fc90949fa1c83eee4f030 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059336" comment="tomcat5-admin-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059337" comment="tomcat5-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059338" comment="tomcat5 less than 5.0.30-27.42"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2902</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2902" source="CVE"/>
	<description>
	Directory traversal vulnerability in Apache Tomcat 5.5.0 through 5.5.28 and 6.0.0 through 6.0.20 allows remote attackers to delete work-directory files via directory traversal sequences in a WAR filename, as demonstrated by the ...war filename.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b82096c2a3a7e9d5c2d4b75219cdb46 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059970" comment="tomcat5-admin-webapps less than 5.0.30-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059971" comment="tomcat5-webapps less than 5.0.30-27.45"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059972" comment="tomcat5 less than 5.0.30-27.45"/>
		</criteria>
	</criteria>
	<!-- 80929169daa1efe3e09dfd990377bfc6 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059325" comment="tomcat5-admin-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059326" comment="tomcat5-webapps less than 5.5.27-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059327" comment="tomcat5 less than 5.5.27-0.9.1"/>
		</criteria>
	</criteria>
	<!-- f4a91f888d8fc90949fa1c83eee4f030 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059336" comment="tomcat5-admin-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059337" comment="tomcat5-webapps less than 5.0.30-27.42"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059338" comment="tomcat5 less than 5.0.30-27.42"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2903</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-2903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2903" source="CVE"/>
	<description>
	Memory leak in the appletalk subsystem in the Linux kernel 2.4.x through 2.4.37.6 and 2.6.x through 2.6.31, when the appletalk and ipddp modules are loaded but the ipddp"N" device is not found, allows remote attackers to cause a denial of service (memory consumption) via IP-DDP datagrams.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2905</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2905" source="CVE"/>
	<description>
	Heap-based buffer overflow in textbox.c in newt 0.51.5, 0.51.6, and 0.52.2 allows local users to cause a denial of service (application crash) or possibly execute arbitrary code via a request to display a crafted text dialog box.
	</description>
 </metadata>
<!-- 0038dbc5541de50206b66dae2afc71a2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009055760" comment="libnewt0_52 less than 0.52.10-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055761" comment="newt-devel less than 0.52.10-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055762" comment="newt-doc less than 0.52.10-7.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009055763" comment="newt less than 0.52.10-7.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2906</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2906" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2906" source="CVE"/>
	<description>
	smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9f3b68ab973a8958802693988f631ec2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055591" comment="libmsrpc-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055592" comment="libmsrpc less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055581" comment="libsmbclient-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055602" comment="libsmbsharemodes-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055603" comment="libsmbsharemodes less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055598" comment="samba-python less than 3.0.32-0.16"/>
		</criteria>
	</criteria>
	<!-- dc4ae9dd35f01cf1f82feae5daa110f6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055614" comment="cifs-mount less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055615" comment="ldapsmb less than 1.34b-25.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055627" comment="libmsrpc-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055628" comment="libmsrpc less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055616" comment="libsmbclient-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055629" comment="libsmbclient-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055617" comment="libsmbclient-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055630" comment="libsmbclient-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055618" comment="libsmbclient less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055619" comment="samba-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055631" comment="samba-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055620" comment="samba-client-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055632" comment="samba-client-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055633" comment="samba-client-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055621" comment="samba-client less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055622" comment="samba-krb-printing less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055634" comment="samba-python less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055623" comment="samba-vscan less than 0.3.6b-43.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055624" comment="samba-winbind-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055635" comment="samba-winbind-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055636" comment="samba-winbind-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055625" comment="samba-winbind less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055637" comment="samba-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055626" comment="samba less than 3.0.36-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055627" comment="libmsrpc-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055628" comment="libmsrpc less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055617" comment="libsmbclient-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055758" comment="libsmbsharemodes-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055759" comment="libsmbsharemodes less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055634" comment="samba-python less than 3.0.36-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2909</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2909" source="CVE"/>
	<description>
	Integer signedness error in the ax25_setsockopt function in net/ax25/af_ax25.c in the ax25 subsystem in the Linux kernel before 2.6.31.2 allows local users to cause a denial of service (OOPS) via a crafted optlen value in an SO_BINDTODEVICE operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2cf3d40457c9435953c26b8e74c24432 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056151" comment="kernel-iseries64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056153" comment="kernel-ppc64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 4d39ec6d8748e038ab04a0b27f7382a1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056156" comment="kernel-bigsmp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056161" comment="kernel-kdumppae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056162" comment="kernel-vmi less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056163" comment="kernel-vmipae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5fb2b55e46097825cba505848cb839cb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- b7e0a3a4762fed8e2796b6c6a47318da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
		</criteria>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- ddf0cfe0200a78301be8b1d7b78fb645 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2910</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2910" source="CVE"/>
	<description>
	arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.31.4 on the x86_64 platform does not clear certain kernel registers before a return to user mode, which allows local users to read register values from an earlier process by switching an ia32 process to 64-bit mode.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2cf3d40457c9435953c26b8e74c24432 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056151" comment="kernel-iseries64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056153" comment="kernel-ppc64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 4d39ec6d8748e038ab04a0b27f7382a1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056156" comment="kernel-bigsmp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056161" comment="kernel-kdumppae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056162" comment="kernel-vmi less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056163" comment="kernel-vmipae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5fb2b55e46097825cba505848cb839cb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- b7e0a3a4762fed8e2796b6c6a47318da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
		</criteria>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- ddf0cfe0200a78301be8b1d7b78fb645 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2948</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2948" source="CVE"/>
	<description>
	mount.cifs in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8 and 3.4 before 3.4.2, when mount.cifs is installed suid root, does not properly enforce permissions, which allows local users to read part of the credentials file and obtain the password by specifying the path to the credentials file and using the --verbose or -v option.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9f3b68ab973a8958802693988f631ec2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055591" comment="libmsrpc-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055592" comment="libmsrpc less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055581" comment="libsmbclient-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055602" comment="libsmbsharemodes-devel less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055603" comment="libsmbsharemodes less than 3.0.32-0.16"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055598" comment="samba-python less than 3.0.32-0.16"/>
		</criteria>
	</criteria>
	<!-- dc4ae9dd35f01cf1f82feae5daa110f6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055614" comment="cifs-mount less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055615" comment="ldapsmb less than 1.34b-25.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055627" comment="libmsrpc-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055628" comment="libmsrpc less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055616" comment="libsmbclient-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055629" comment="libsmbclient-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055617" comment="libsmbclient-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055630" comment="libsmbclient-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055618" comment="libsmbclient less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055619" comment="samba-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055631" comment="samba-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055620" comment="samba-client-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055632" comment="samba-client-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055633" comment="samba-client-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055621" comment="samba-client less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055622" comment="samba-krb-printing less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055634" comment="samba-python less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055623" comment="samba-vscan less than 0.3.6b-43.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055624" comment="samba-winbind-32bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055635" comment="samba-winbind-64bit less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055636" comment="samba-winbind-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055625" comment="samba-winbind less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055637" comment="samba-x86 less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055626" comment="samba less than 3.0.36-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055627" comment="libmsrpc-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055628" comment="libmsrpc less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055617" comment="libsmbclient-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055758" comment="libsmbsharemodes-devel less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055759" comment="libsmbsharemodes less than 3.0.36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055634" comment="samba-python less than 3.0.36-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2949</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2949" source="CVE"/>
	<description>
	Integer overflow in the XPMReader::ReadXPM function in filter.vcl/ixpm/svt_xpmread.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to execute arbitrary code via a crafted XPM file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17aa6adc1c5e58a79af02c479d95aab1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058675" comment="OpenOffice_org-cs less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058677" comment="OpenOffice_org-de less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058678" comment="OpenOffice_org-es less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058680" comment="OpenOffice_org-fr less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058681" comment="OpenOffice_org-galleries less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058682" comment="OpenOffice_org-gnome less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058685" comment="OpenOffice_org-hu less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058686" comment="OpenOffice_org-it less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058687" comment="OpenOffice_org-ja less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058688" comment="OpenOffice_org-kde less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058689" comment="OpenOffice_org-mono less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058694" comment="OpenOffice_org-pl less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058695" comment="OpenOffice_org-pt-BR less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058697" comment="OpenOffice_org-sk less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058700" comment="OpenOffice_org-zh-CN less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058701" comment="OpenOffice_org-zh-TW less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058703" comment="OpenOffice_org less than 3.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8cf721e6c038d1eb986a470c51370399 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058707" comment="OpenOffice_org-cs less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058709" comment="OpenOffice_org-de less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058712" comment="OpenOffice_org-es less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058714" comment="OpenOffice_org-fr less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058715" comment="OpenOffice_org-galleries less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058716" comment="OpenOffice_org-gnome less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058719" comment="OpenOffice_org-hu less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058720" comment="OpenOffice_org-it less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058721" comment="OpenOffice_org-ja less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058722" comment="OpenOffice_org-kde less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058724" comment="OpenOffice_org-mono less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058729" comment="OpenOffice_org-pl less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058730" comment="OpenOffice_org-pt-BR less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058732" comment="OpenOffice_org-sk less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058735" comment="OpenOffice_org-zh-CN less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058736" comment="OpenOffice_org-zh-TW less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058738" comment="OpenOffice_org less than 3.2-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20092950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-2950</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-2950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2950" source="CVE"/>
	<description>
	Heap-based buffer overflow in the GIFLZWDecompressor::GIFLZWDecompressor function in filter.vcl/lgif/decode.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted GIF file, related to LZW decompression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17aa6adc1c5e58a79af02c479d95aab1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058675" comment="OpenOffice_org-cs less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058677" comment="OpenOffice_org-de less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058678" comment="OpenOffice_org-es less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058680" comment="OpenOffice_org-fr less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058681" comment="OpenOffice_org-galleries less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058682" comment="OpenOffice_org-gnome less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058685" comment="OpenOffice_org-hu less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058686" comment="OpenOffice_org-it less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058687" comment="OpenOffice_org-ja less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058688" comment="OpenOffice_org-kde less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058689" comment="OpenOffice_org-mono less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058694" comment="OpenOffice_org-pl less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058695" comment="OpenOffice_org-pt-BR less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058697" comment="OpenOffice_org-sk less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058700" comment="OpenOffice_org-zh-CN less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058701" comment="OpenOffice_org-zh-TW less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058703" comment="OpenOffice_org less than 3.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8cf721e6c038d1eb986a470c51370399 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058707" comment="OpenOffice_org-cs less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058709" comment="OpenOffice_org-de less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058712" comment="OpenOffice_org-es less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058714" comment="OpenOffice_org-fr less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058715" comment="OpenOffice_org-galleries less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058716" comment="OpenOffice_org-gnome less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058719" comment="OpenOffice_org-hu less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058720" comment="OpenOffice_org-it less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058721" comment="OpenOffice_org-ja less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058722" comment="OpenOffice_org-kde less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058724" comment="OpenOffice_org-mono less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058729" comment="OpenOffice_org-pl less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058730" comment="OpenOffice_org-pt-BR less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058732" comment="OpenOffice_org-sk less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058735" comment="OpenOffice_org-zh-CN less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058736" comment="OpenOffice_org-zh-TW less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058738" comment="OpenOffice_org less than 3.2-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3002</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3002" source="CVE"/>
	<description>
	The Linux kernel before 2.6.31-rc7 does not initialize certain data structures within getname functions, which allows local users to read the contents of some kernel memory locations by calling getsockname on (1) an AF_APPLETALK socket, related to the atalk_getname function in net/appletalk/ddp.c; (2) an AF_IRDA socket, related to the irda_getname function in net/irda/af_irda.c; (3) an AF_ECONET socket, related to the econet_getname function in net/econet/af_econet.c; (4) an AF_NETROM socket, related to the nr_getname function in net/netrom/af_netrom.c; (5) an AF_ROSE socket, related to the rose_getname function in net/rose/af_rose.c; or (6) a raw CAN socket, related to the raw_getname function in net/can/raw.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3025</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3025" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3025" source="CVE"/>
	<description>
	Unspecified vulnerability in Pidgin 2.6.0 allows remote attackers to cause a denial of service (crash) via a link in a Yahoo IM.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d28df07e249dc388685ce92f96c4b80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056811" comment="finch-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056808" comment="finch less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056812" comment="libpurple-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056809" comment="libpurple less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056813" comment="pidgin-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056810" comment="pidgin less than 2.6.3-0.4.2"/>
		</criteria>
	</criteria>
	<!-- 9b89dca2177efa5da444e8dfb83b1662 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056817" comment="finch-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056814" comment="finch less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056818" comment="libpurple-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056815" comment="libpurple less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056819" comment="pidgin-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056816" comment="pidgin less than 2.6.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3026</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3026" source="CVE"/>
	<description>
	protocols/jabber/auth.c in libpurple in Pidgin 2.6.0, and possibly other versions, does not follow the "require TLS/SSL" preference when connecting to older Jabber servers that do not follow the XMPP specification, which causes libpurple to connect to the server without the expected encryption and allows remote attackers to sniff sessions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d28df07e249dc388685ce92f96c4b80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056811" comment="finch-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056808" comment="finch less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056812" comment="libpurple-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056809" comment="libpurple less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056813" comment="pidgin-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056810" comment="pidgin less than 2.6.3-0.4.2"/>
		</criteria>
	</criteria>
	<!-- 9b89dca2177efa5da444e8dfb83b1662 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056817" comment="finch-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056814" comment="finch less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056818" comment="libpurple-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056815" comment="libpurple less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056819" comment="pidgin-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056816" comment="pidgin less than 2.6.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3050</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3050" source="CVE"/>
	<description>
	Buffer overflow in the set_page_size function in util.cxx in HTMLDOC 1.8.27 and earlier allows context-dependent attackers to execute arbitrary code via a long MEDIA SIZE comment.  NOTE: it was later reported that there were additional vectors in htmllib.cxx and ps-pdf.cxx using an AFM font file with a long glyph name, but these vectors do not cross privilege boundaries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 228fc2258cf128b65eabf3d579a38e89 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056911" comment="htmldoc less than 1.8.25-13.8.1"/>
	</criteria>
	<!-- fce8dfc4f79505ada0acf15e5a71ed1c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056911" comment="htmldoc less than 1.8.25-13.8.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3069</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3069" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3070</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3070" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3071</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3071" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.2, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3072</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3072" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.3, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the BinHex decoder in netwerk/streamconv/converters/nsBinHexDecoder.cpp, and unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3073</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3073" source="CVE"/>
	<description>
	Unspecified vulnerability in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3075</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3075" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox before 3.0.14 and 3.5.x before 3.5.2, Thunderbird before 2.0.0.24, and SeaMonkey before 1.1.19 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to use of mutable strings in the js_StringReplaceHelper function in js/src/jsstr.cpp, and unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3076</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3076" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.14 does not properly implement certain dialogs associated with the (1) pkcs11.addmodule and (2) pkcs11.deletemodule operations, which makes it easier for remote attackers to trick a user into installing or removing an arbitrary PKCS11 module.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3077</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3077" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, does not properly manage pointers for the columns (aka TreeColumns) of a XUL tree element, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3078</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3078" source="CVE"/>
	<description>
	Visual truncation vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to trigger a vertical scroll and spoof URLs via unspecified Unicode characters with a tall line-height property.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3079</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3079" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox before 3.0.14, and 3.5.x before 3.5.3, allows remote attackers to execute arbitrary JavaScript with chrome privileges via vectors involving an object, the FeedWriter, and the BrowserFeedWriter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a4c88afeb5760a7fe4eca88867fc993 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055377" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055378" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055379" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055380" comment="python-xpcom190 less than 1.9.0.14-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055381" comment="python-xpcom191 less than 1.9.1.3-1.4.2"/>
		</criteria>
	</criteria>
	<!-- 0dcf54ecfb8ca7d6807c24bf27729992 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055434" comment="MozillaFirefox-branding-SLED less than 3.5-1.6.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055435" comment="MozillaFirefox-translations less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055436" comment="MozillaFirefox less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055437" comment="mozilla-xulrunner190-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055438" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055439" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055440" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055441" comment="mozilla-xulrunner190-translations less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055442" comment="mozilla-xulrunner190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055443" comment="mozilla-xulrunner191-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055444" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055445" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055446" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055447" comment="mozilla-xulrunner191-translations less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055448" comment="mozilla-xulrunner191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055764" comment="MozillaFirefox-branding-upstream less than 3.5.3-1.5.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055765" comment="mozilla-xulrunner190-devel less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055766" comment="mozilla-xulrunner191-devel less than 1.9.1.3-1.5.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055767" comment="python-xpcom190 less than 1.9.0.14-0.6.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055768" comment="python-xpcom191 less than 1.9.1.3-1.5.7"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3080</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3080" source="CVE"/>
	<description>
	Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3083</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3083" source="CVE"/>
	<description>
	The msn_slp_sip_recv function in libpurple/protocols/msn/slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an SLP invite message that lacks certain required fields, as demonstrated by a malformed message from a KMess client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d28df07e249dc388685ce92f96c4b80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056811" comment="finch-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056808" comment="finch less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056812" comment="libpurple-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056809" comment="libpurple less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056813" comment="pidgin-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056810" comment="pidgin less than 2.6.3-0.4.2"/>
		</criteria>
	</criteria>
	<!-- 9b89dca2177efa5da444e8dfb83b1662 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056817" comment="finch-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056814" comment="finch less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056818" comment="libpurple-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056815" comment="libpurple less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056819" comment="pidgin-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056816" comment="pidgin less than 2.6.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3084</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3084" source="CVE"/>
	<description>
	The msn_slp_process_msg function in libpurple/protocols/msn/slpcall.c in the MSN protocol plugin in libpurple 2.6.0 and 2.6.1, as used in Pidgin before 2.6.2, allows remote attackers to cause a denial of service (application crash) via a handwritten (aka Ink) message, related to an uninitialized variable and the incorrect "UTF16-LE" charset name.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d28df07e249dc388685ce92f96c4b80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056811" comment="finch-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056808" comment="finch less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056812" comment="libpurple-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056809" comment="libpurple less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056813" comment="pidgin-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056810" comment="pidgin less than 2.6.3-0.4.2"/>
		</criteria>
	</criteria>
	<!-- 9b89dca2177efa5da444e8dfb83b1662 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056817" comment="finch-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056814" comment="finch less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056818" comment="libpurple-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056815" comment="libpurple less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056819" comment="pidgin-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056816" comment="pidgin less than 2.6.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3085</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3085" source="CVE"/>
	<description>
	The XMPP protocol plugin in libpurple in Pidgin before 2.6.2 does not properly handle an error IQ stanza during an attempted fetch of a custom smiley, which allows remote attackers to cause a denial of service (application crash) via XHTML-IM content with cid: images.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d28df07e249dc388685ce92f96c4b80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056811" comment="finch-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056808" comment="finch less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056812" comment="libpurple-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056809" comment="libpurple less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056813" comment="pidgin-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056810" comment="pidgin less than 2.6.3-0.4.2"/>
		</criteria>
	</criteria>
	<!-- 9b89dca2177efa5da444e8dfb83b1662 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056817" comment="finch-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056814" comment="finch less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056818" comment="libpurple-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056815" comment="libpurple less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056819" comment="pidgin-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056816" comment="pidgin less than 2.6.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3094</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3094" source="CVE"/>
	<description>
	The ap_proxy_ftp_handler function in modules/proxy/proxy_ftp.c in the mod_proxy_ftp module in the Apache HTTP Server 2.0.63 and 2.2.13 allows remote FTP servers to cause a denial of service (NULL pointer dereference and child process crash) via a malformed reply to an EPSV command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de2d508793de8ff7df41d3b20495e54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055745" comment="apache2-devel less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055746" comment="apache2-doc less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055747" comment="apache2-example-pages less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055748" comment="apache2-prefork less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055749" comment="apache2-worker less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055750" comment="apache2 less than 2.2.3-16.28.1"/>
		</criteria>
	</criteria>
	<!-- d5b711121aff7f0480198634eaa0003e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055752" comment="apache2-devel less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055753" comment="apache2-doc less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055754" comment="apache2-example-pages less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055755" comment="apache2-prefork less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055756" comment="apache2-worker less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055757" comment="apache2 less than 2.2.3-16.25.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3095</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3095" source="CVE"/>
	<description>
	The mod_proxy_ftp module in the Apache HTTP Server allows remote attackers to bypass intended access restrictions and send arbitrary commands to an FTP server via vectors related to the embedding of these commands in the Authorization HTTP header, as demonstrated by a certain module in VulnDisco Pack Professional 8.11.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8de2d508793de8ff7df41d3b20495e54 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055745" comment="apache2-devel less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055746" comment="apache2-doc less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055747" comment="apache2-example-pages less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055748" comment="apache2-prefork less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055749" comment="apache2-worker less than 2.2.3-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055750" comment="apache2 less than 2.2.3-16.28.1"/>
		</criteria>
	</criteria>
	<!-- d5b711121aff7f0480198634eaa0003e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055752" comment="apache2-devel less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055753" comment="apache2-doc less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055754" comment="apache2-example-pages less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055755" comment="apache2-prefork less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055756" comment="apache2-worker less than 2.2.3-16.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055757" comment="apache2 less than 2.2.3-16.25.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3111</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3111" source="CVE"/>
	<description>
	The rad_decode function in FreeRADIUS before 1.1.8 allows remote attackers to cause a denial of service (radiusd crash) via zero-length Tunnel-Password attributes, as demonstrated by a certain module in VulnDisco Pack Professional 7.6 through 8.11.  NOTE: this is a regression error related to CVE-2003-0967.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 200ec1d7d523c545a99a6c28d59ee91b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055870" comment="freeradius-devel less than 1.1.7-21.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055871" comment="freeradius less than 1.1.7-21.5.1"/>
		</criteria>
	</criteria>
	<!-- 5bb4ad57205dcbcfa71a4ce9ab5750bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055117" comment="freeradius-devel less than 1.1.0-19.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055118" comment="freeradius less than 1.1.0-19.14"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3229</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3229" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, and 8.2 before 8.2.14 allows remote authenticated users to cause a denial of service (backend shutdown) by "re-LOAD-ing" libraries from a certain plugins directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b265c261559c08a75d17afd72f670c10 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055452" comment="postgresql-contrib less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055449" comment="postgresql-devel less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055453" comment="postgresql-docs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055450" comment="postgresql-libs-32bit less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055454" comment="postgresql-libs-64bit less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055455" comment="postgresql-libs-x86 less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055451" comment="postgresql-libs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055456" comment="postgresql-pl less than 8.1.18-0.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055457" comment="postgresql-server less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055458" comment="postgresql less than 8.1.18-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055452" comment="postgresql-contrib less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055449" comment="postgresql-devel less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055453" comment="postgresql-docs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055456" comment="postgresql-pl less than 8.1.18-0.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055457" comment="postgresql-server less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055458" comment="postgresql less than 8.1.18-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d54fe11a1fedabb0b5b6bfa0f9102341 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055051" comment="postgresql-contrib less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055048" comment="postgresql-devel less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055052" comment="postgresql-docs less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055055" comment="postgresql-pl less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055056" comment="postgresql-server less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055057" comment="postgresql less than 8.1.18-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3230</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3230" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.4 before 8.4.1, 8.3 before 8.3.8, 8.2 before 8.2.14, 8.1 before 8.1.18, 8.0 before 8.0.22, and 7.4 before 7.4.26 does not use the appropriate privileges for the (1) RESET ROLE and (2) RESET SESSION AUTHORIZATION operations, which allows remote authenticated users to gain privileges.  NOTE: this is due to an incomplete fix for CVE-2007-6600.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b265c261559c08a75d17afd72f670c10 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055452" comment="postgresql-contrib less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055449" comment="postgresql-devel less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055453" comment="postgresql-docs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055450" comment="postgresql-libs-32bit less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055454" comment="postgresql-libs-64bit less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055455" comment="postgresql-libs-x86 less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055451" comment="postgresql-libs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055456" comment="postgresql-pl less than 8.1.18-0.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055457" comment="postgresql-server less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055458" comment="postgresql less than 8.1.18-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055452" comment="postgresql-contrib less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055449" comment="postgresql-devel less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055453" comment="postgresql-docs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055456" comment="postgresql-pl less than 8.1.18-0.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055457" comment="postgresql-server less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055458" comment="postgresql less than 8.1.18-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d54fe11a1fedabb0b5b6bfa0f9102341 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055051" comment="postgresql-contrib less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055048" comment="postgresql-devel less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055052" comment="postgresql-docs less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055055" comment="postgresql-pl less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055056" comment="postgresql-server less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055057" comment="postgresql less than 8.1.18-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3231</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3231" source="CVE"/>
	<description>
	The core server component in PostgreSQL 8.3 before 8.3.8 and 8.2 before 8.2.14, when using LDAP authentication with anonymous binds, allows remote attackers to bypass authentication via an empty password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b265c261559c08a75d17afd72f670c10 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055452" comment="postgresql-contrib less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055449" comment="postgresql-devel less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055453" comment="postgresql-docs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055450" comment="postgresql-libs-32bit less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055454" comment="postgresql-libs-64bit less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055455" comment="postgresql-libs-x86 less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055451" comment="postgresql-libs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055456" comment="postgresql-pl less than 8.1.18-0.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055457" comment="postgresql-server less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055458" comment="postgresql less than 8.1.18-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055452" comment="postgresql-contrib less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055449" comment="postgresql-devel less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055453" comment="postgresql-docs less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055456" comment="postgresql-pl less than 8.1.18-0.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055457" comment="postgresql-server less than 8.1.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055458" comment="postgresql less than 8.1.18-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d54fe11a1fedabb0b5b6bfa0f9102341 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055051" comment="postgresql-contrib less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055048" comment="postgresql-devel less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055052" comment="postgresql-docs less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055055" comment="postgresql-pl less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055056" comment="postgresql-server less than 8.1.18-0.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055057" comment="postgresql less than 8.1.18-0.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3235</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3235" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the Sieve plugin in Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, as derived from Cyrus libsieve, allow context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted SIEVE script, as demonstrated by forwarding an e-mail message to a large number of recipients, a different vulnerability than CVE-2009-2632.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f45822c08856bf5fd4adfa0bf994837 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055808" comment="cyrus-imapd-devel less than 2.2.12-27.14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055809" comment="cyrus-imapd less than 2.2.12-27.14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055810" comment="perl-Cyrus-IMAP less than 2.2.12-27.14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055811" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.14.2"/>
		</criteria>
	</criteria>
	<!-- c6aca2472f8feedc53cd3131acc49479 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055817" comment="cyrus-imapd-devel less than 2.2.12-27.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055818" comment="cyrus-imapd less than 2.2.12-27.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055819" comment="perl-Cyrus-IMAP less than 2.2.12-27.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055820" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3238</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3238" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3238" source="CVE"/>
	<description>
	The get_random_int function in drivers/char/random.c in the Linux kernel before 2.6.30 produces insufficiently random numbers, which allows attackers to predict the return value, and possibly defeat protection mechanisms based on randomization, via vectors that leverage the function's tendency to "return the same value over and over again for long stretches of time."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2cf3d40457c9435953c26b8e74c24432 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056151" comment="kernel-iseries64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056153" comment="kernel-ppc64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 4d39ec6d8748e038ab04a0b27f7382a1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056156" comment="kernel-bigsmp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056161" comment="kernel-kdumppae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056162" comment="kernel-vmi less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056163" comment="kernel-vmipae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5fb2b55e46097825cba505848cb839cb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- b7e0a3a4762fed8e2796b6c6a47318da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
		</criteria>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- ddf0cfe0200a78301be8b1d7b78fb645 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3245</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3245" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3245" source="CVE"/>
	<description>
	OpenSSL before 0.9.8m does not check for a NULL return value from bn_wexpand function calls in (1) crypto/bn/bn_div.c, (2) crypto/bn/bn_gf2m.c, (3) crypto/ec/ec2_smpl.c, and (4) engines/e_ubsec.c, which has unspecified impact and context-dependent attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 045df4135757c0ab62aa79c2419c1dad -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059228" comment="openssl-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059232" comment="openssl-64bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059229" comment="openssl-devel-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059233" comment="openssl-devel-64bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059230" comment="openssl-devel less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059234" comment="openssl-doc less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059235" comment="openssl-x86 less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059231" comment="openssl less than 0.9.8a-18.42.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059228" comment="openssl-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059229" comment="openssl-devel-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059230" comment="openssl-devel less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059234" comment="openssl-doc less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059231" comment="openssl less than 0.9.8a-18.42.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059234" comment="openssl-doc less than 0.9.8a-18.42.2"/>
		</criteria></criteria>
	<!-- b983aa73d822e89c7b49b150b10a8cab -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059236" comment="openssl-32bit less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059237" comment="openssl-devel-32bit less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059238" comment="openssl-devel less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059242" comment="openssl-doc less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059239" comment="openssl less than 0.9.8a-18.39.6"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059242" comment="openssl-doc less than 0.9.8a-18.39.6"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3274</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3274" source="CVE"/>
	<description>
	Mozilla Firefox 3.6a1, 3.5.3, 3.5.2, and earlier 3.5.x versions, and 3.0.14 and earlier 2.x and 3.x versions, on Linux uses a predictable /tmp pathname for files selected from the Downloads window, which allows local users to replace an arbitrary downloaded file by placing a file in a /tmp location before the download occurs, related to the Download Manager component. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3286</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3286" source="CVE"/>
	<description>
	NFSv4 in the Linux kernel 2.6.18, and possibly other versions, does not properly clean up an inode when an O_EXCL create fails, which causes files to be created with insecure settings such as setuid bits, and possibly allows local users to gain privileges, related to the execution of the do_open_permission function even when a create fails.
	</description>
 </metadata>
<!-- 30de1fffa1acea350d261006806caaef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3291</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3291" source="CVE"/>
	<description>
	The php_openssl_apply_verification_policy function in PHP before 5.2.11 does not properly perform certificate validation, which has unknown impact and attack vectors, probably related to an ability to spoof certificates.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 54e1707c263932ac5174bd6b1c072016 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055242" comment="apache2-mod_php5 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055243" comment="php5-bcmath less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055244" comment="php5-bz2 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055245" comment="php5-calendar less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055246" comment="php5-ctype less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055247" comment="php5-curl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055248" comment="php5-dba less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055249" comment="php5-dbase less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055250" comment="php5-devel less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055251" comment="php5-dom less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055252" comment="php5-exif less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055253" comment="php5-fastcgi less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055254" comment="php5-ftp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055255" comment="php5-gd less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055256" comment="php5-gettext less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055257" comment="php5-gmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055258" comment="php5-iconv less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055259" comment="php5-imap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055261" comment="php5-ldap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055262" comment="php5-mbstring less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055263" comment="php5-mcrypt less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055264" comment="php5-mhash less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055265" comment="php5-mysql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055266" comment="php5-ncurses less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055267" comment="php5-odbc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055268" comment="php5-openssl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055269" comment="php5-pcntl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055270" comment="php5-pdo less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055271" comment="php5-pear less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055272" comment="php5-pgsql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055273" comment="php5-posix less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055274" comment="php5-pspell less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055275" comment="php5-shmop less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055276" comment="php5-snmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055277" comment="php5-soap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055278" comment="php5-sockets less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055279" comment="php5-sqlite less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055280" comment="php5-suhosin less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055281" comment="php5-sysvmsg less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055282" comment="php5-sysvsem less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055283" comment="php5-sysvshm less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055290" comment="php5-tidy less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055284" comment="php5-tokenizer less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055285" comment="php5-wddx less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055286" comment="php5-xmlreader less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055287" comment="php5-xmlrpc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055288" comment="php5-xsl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055289" comment="php5-zlib less than 5.2.5-9.22"/>
		</criteria>
	</criteria>
	<!-- d251a09fdb720a4a0919a0c5eddb9a7e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055988" comment="php5-json less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056018" comment="php5-tidy less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3292</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3292" source="CVE"/>
	<description>
	Unspecified vulnerability in PHP before 5.2.11, and 5.3.x before 5.3.1, has unknown impact and attack vectors related to "missing sanity checks around exif processing."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 54e1707c263932ac5174bd6b1c072016 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055242" comment="apache2-mod_php5 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055243" comment="php5-bcmath less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055244" comment="php5-bz2 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055245" comment="php5-calendar less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055246" comment="php5-ctype less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055247" comment="php5-curl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055248" comment="php5-dba less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055249" comment="php5-dbase less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055250" comment="php5-devel less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055251" comment="php5-dom less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055252" comment="php5-exif less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055253" comment="php5-fastcgi less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055254" comment="php5-ftp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055255" comment="php5-gd less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055256" comment="php5-gettext less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055257" comment="php5-gmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055258" comment="php5-iconv less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055259" comment="php5-imap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055261" comment="php5-ldap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055262" comment="php5-mbstring less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055263" comment="php5-mcrypt less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055264" comment="php5-mhash less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055265" comment="php5-mysql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055266" comment="php5-ncurses less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055267" comment="php5-odbc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055268" comment="php5-openssl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055269" comment="php5-pcntl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055270" comment="php5-pdo less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055271" comment="php5-pear less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055272" comment="php5-pgsql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055273" comment="php5-posix less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055274" comment="php5-pspell less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055275" comment="php5-shmop less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055276" comment="php5-snmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055277" comment="php5-soap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055278" comment="php5-sockets less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055279" comment="php5-sqlite less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055280" comment="php5-suhosin less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055281" comment="php5-sysvmsg less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055282" comment="php5-sysvsem less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055283" comment="php5-sysvshm less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055290" comment="php5-tidy less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055284" comment="php5-tokenizer less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055285" comment="php5-wddx less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055286" comment="php5-xmlreader less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055287" comment="php5-xmlrpc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055288" comment="php5-xsl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055289" comment="php5-zlib less than 5.2.5-9.22"/>
		</criteria>
	</criteria>
	<!-- d251a09fdb720a4a0919a0c5eddb9a7e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055988" comment="php5-json less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056018" comment="php5-tidy less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3293</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3293" source="CVE"/>
	<description>
	Unspecified vulnerability in the imagecolortransparent function in PHP before 5.2.11 has unknown impact and attack vectors related to an incorrect "sanity check for the color index."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 54e1707c263932ac5174bd6b1c072016 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055242" comment="apache2-mod_php5 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055243" comment="php5-bcmath less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055244" comment="php5-bz2 less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055245" comment="php5-calendar less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055246" comment="php5-ctype less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055247" comment="php5-curl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055248" comment="php5-dba less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055249" comment="php5-dbase less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055250" comment="php5-devel less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055251" comment="php5-dom less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055252" comment="php5-exif less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055253" comment="php5-fastcgi less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055254" comment="php5-ftp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055255" comment="php5-gd less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055256" comment="php5-gettext less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055257" comment="php5-gmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055258" comment="php5-iconv less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055259" comment="php5-imap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055261" comment="php5-ldap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055262" comment="php5-mbstring less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055263" comment="php5-mcrypt less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055264" comment="php5-mhash less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055265" comment="php5-mysql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055266" comment="php5-ncurses less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055267" comment="php5-odbc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055268" comment="php5-openssl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055269" comment="php5-pcntl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055270" comment="php5-pdo less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055271" comment="php5-pear less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055272" comment="php5-pgsql less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055273" comment="php5-posix less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055274" comment="php5-pspell less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055275" comment="php5-shmop less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055276" comment="php5-snmp less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055277" comment="php5-soap less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055278" comment="php5-sockets less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055279" comment="php5-sqlite less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055280" comment="php5-suhosin less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055281" comment="php5-sysvmsg less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055282" comment="php5-sysvsem less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055283" comment="php5-sysvshm less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055290" comment="php5-tidy less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055284" comment="php5-tokenizer less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055285" comment="php5-wddx less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055286" comment="php5-xmlreader less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055287" comment="php5-xmlrpc less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055288" comment="php5-xsl less than 5.2.5-9.22"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055289" comment="php5-zlib less than 5.2.5-9.22"/>
		</criteria>
	</criteria>
	<!-- d251a09fdb720a4a0919a0c5eddb9a7e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055988" comment="php5-json less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055970" comment="apache2-mod_php5 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055971" comment="php5-bcmath less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055972" comment="php5-bz2 less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055973" comment="php5-calendar less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055974" comment="php5-ctype less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055975" comment="php5-curl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055976" comment="php5-dba less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055977" comment="php5-dbase less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055978" comment="php5-devel less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055979" comment="php5-dom less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055980" comment="php5-exif less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055981" comment="php5-fastcgi less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055982" comment="php5-ftp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055983" comment="php5-gd less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055984" comment="php5-gettext less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055985" comment="php5-gmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055986" comment="php5-iconv less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055987" comment="php5-imap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055989" comment="php5-ldap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055990" comment="php5-mbstring less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055991" comment="php5-mcrypt less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055992" comment="php5-mhash less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055993" comment="php5-mysql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055994" comment="php5-ncurses less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055995" comment="php5-odbc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055996" comment="php5-openssl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055997" comment="php5-pcntl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055998" comment="php5-pdo less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055999" comment="php5-pear less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056000" comment="php5-pgsql less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056001" comment="php5-posix less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056002" comment="php5-pspell less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056003" comment="php5-shmop less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056004" comment="php5-snmp less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056005" comment="php5-soap less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056006" comment="php5-sockets less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056007" comment="php5-sqlite less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056008" comment="php5-suhosin less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056009" comment="php5-sysvmsg less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056010" comment="php5-sysvsem less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056011" comment="php5-sysvshm less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056018" comment="php5-tidy less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056012" comment="php5-tokenizer less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056013" comment="php5-wddx less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056014" comment="php5-xmlreader less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056015" comment="php5-xmlrpc less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056016" comment="php5-xsl less than 5.2.5-9.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056017" comment="php5-zlib less than 5.2.5-9.23.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3297</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3297" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-0787, CVE-2010-0788, CVE-2010-0789.  Reason: this candidate was intended for one issue in Samba, but it was used for multiple distinct issues, including one in FUSE and one in ncpfs.  Notes: All CVE users should consult CVE-2010-0787 (Samba), CVE-2010-0788 (ncpfs), and CVE-2010-0789 (FUSE) to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2bb787ad300cc7809b9b476f062c8a98 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060030" comment="fuse-devel less than 2.7.2-15.6.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060031" comment="fuse less than 2.7.2-15.6.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060032" comment="libfuse2 less than 2.7.2-15.6.4"/>
		</criteria>
	</criteria>
	<!-- 6a69e558001894fbe19e2b3df6063065 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060033" comment="fuse-devel less than 2.7.2-15.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060034" comment="fuse less than 2.7.2-15.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060035" comment="libfuse2 less than 2.7.2-15.8.1"/>
		</criteria>
	</criteria>
	<!-- 7635d6d98a4ad4f020612e70683a8397 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057947" comment="fuse-devel less than 2.7.2-15.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057948" comment="fuse less than 2.7.2-15.6.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057949" comment="libfuse2 less than 2.7.2-15.6.2"/>
		</criteria>
	</criteria>
	<!-- d1fb23e6fc7336162eafa25df10d4b66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057950" comment="fuse-devel less than 2.7.2-15.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057951" comment="fuse less than 2.7.2-15.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057952" comment="libfuse2 less than 2.7.2-15.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3301</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3301" source="CVE"/>
	<description>
	Integer underflow in filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTDefTable table property modifier in a Word document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17aa6adc1c5e58a79af02c479d95aab1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058675" comment="OpenOffice_org-cs less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058677" comment="OpenOffice_org-de less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058678" comment="OpenOffice_org-es less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058680" comment="OpenOffice_org-fr less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058681" comment="OpenOffice_org-galleries less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058682" comment="OpenOffice_org-gnome less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058685" comment="OpenOffice_org-hu less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058686" comment="OpenOffice_org-it less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058687" comment="OpenOffice_org-ja less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058688" comment="OpenOffice_org-kde less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058689" comment="OpenOffice_org-mono less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058694" comment="OpenOffice_org-pl less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058695" comment="OpenOffice_org-pt-BR less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058697" comment="OpenOffice_org-sk less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058700" comment="OpenOffice_org-zh-CN less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058701" comment="OpenOffice_org-zh-TW less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058703" comment="OpenOffice_org less than 3.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8cf721e6c038d1eb986a470c51370399 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058707" comment="OpenOffice_org-cs less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058709" comment="OpenOffice_org-de less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058712" comment="OpenOffice_org-es less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058714" comment="OpenOffice_org-fr less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058715" comment="OpenOffice_org-galleries less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058716" comment="OpenOffice_org-gnome less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058719" comment="OpenOffice_org-hu less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058720" comment="OpenOffice_org-it less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058721" comment="OpenOffice_org-ja less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058722" comment="OpenOffice_org-kde less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058724" comment="OpenOffice_org-mono less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058729" comment="OpenOffice_org-pl less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058730" comment="OpenOffice_org-pt-BR less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058732" comment="OpenOffice_org-sk less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058735" comment="OpenOffice_org-zh-CN less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058736" comment="OpenOffice_org-zh-TW less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058738" comment="OpenOffice_org less than 3.2-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3302</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3302" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3302" source="CVE"/>
	<description>
	filter/ww8/ww8par2.cxx in OpenOffice.org (OOo) before 3.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted sprmTSetBrc table property modifier in a Word document, related to a "boundary error flaw."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17aa6adc1c5e58a79af02c479d95aab1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058675" comment="OpenOffice_org-cs less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058677" comment="OpenOffice_org-de less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058678" comment="OpenOffice_org-es less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058680" comment="OpenOffice_org-fr less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058681" comment="OpenOffice_org-galleries less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058682" comment="OpenOffice_org-gnome less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058685" comment="OpenOffice_org-hu less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058686" comment="OpenOffice_org-it less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058687" comment="OpenOffice_org-ja less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058688" comment="OpenOffice_org-kde less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058689" comment="OpenOffice_org-mono less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058694" comment="OpenOffice_org-pl less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058695" comment="OpenOffice_org-pt-BR less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058697" comment="OpenOffice_org-sk less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058700" comment="OpenOffice_org-zh-CN less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058701" comment="OpenOffice_org-zh-TW less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058703" comment="OpenOffice_org less than 3.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8cf721e6c038d1eb986a470c51370399 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058707" comment="OpenOffice_org-cs less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058709" comment="OpenOffice_org-de less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058712" comment="OpenOffice_org-es less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058714" comment="OpenOffice_org-fr less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058715" comment="OpenOffice_org-galleries less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058716" comment="OpenOffice_org-gnome less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058719" comment="OpenOffice_org-hu less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058720" comment="OpenOffice_org-it less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058721" comment="OpenOffice_org-ja less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058722" comment="OpenOffice_org-kde less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058724" comment="OpenOffice_org-mono less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058729" comment="OpenOffice_org-pl less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058730" comment="OpenOffice_org-pt-BR less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058732" comment="OpenOffice_org-sk less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058735" comment="OpenOffice_org-zh-CN less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058736" comment="OpenOffice_org-zh-TW less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058738" comment="OpenOffice_org less than 3.2-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3370</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3370" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15, and 3.5.x before 3.5.4, allows remote attackers to read form history by forging mouse and keyboard events that leverage the auto-fill feature to populate form fields, in an attacker-readable form, with history entries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3371</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3371" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code by creating JavaScript web-workers recursively.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3372</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3372" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via a crafted regular expression in a Proxy Auto-configuration (PAC) file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3373</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3373" source="CVE"/>
	<description>
	Heap-based buffer overflow in the GIF image parser in Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3374</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3374" source="CVE"/>
	<description>
	The XPCVariant::VariantDataToJS function in the XPCOM implementation in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 does not enforce intended restrictions on interaction between chrome privileged code and objects obtained from remote web sites, which allows remote attackers to execute arbitrary JavaScript with chrome privileges via unspecified method calls, related to "doubly-wrapped objects."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3375</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3375" source="CVE"/>
	<description>
	content/html/document/src/nsHTMLDocument.cpp in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allows user-assisted remote attackers to bypass the Same Origin Policy and read an arbitrary content selection via the document.getSelection function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3376</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3376" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.15 and 3.5.x before 3.5.4, and SeaMonkey before 2.0, does not properly handle a right-to-left override (aka RLO or U+202E) Unicode character in a download filename, which allows remote attackers to spoof file extensions via a crafted filename, as demonstrated by displaying a non-executable extension for an executable file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3377</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3377" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in liboggz before cf5feeaab69b05e24, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3378</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3378" source="CVE"/>
	<description>
	The oggplay_data_handle_theora_frame function in media/liboggplay/src/liboggplay/oggplay_data.c in liboggplay, as used in Mozilla Firefox 3.5.x before 3.5.4, attempts to reuse an earlier frame data structure upon encountering a decoding error for the first frame, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly execute arbitrary code via a crafted .ogg video file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3379</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3379" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3379" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in libvorbis, as used in Mozilla Firefox 3.5.x before 3.5.4, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via unknown vectors.  NOTE: this might overlap CVE-2009-2663.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3380</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3380" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3380" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 and 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3381</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3381" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3381" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3382</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3382" source="CVE"/>
	<description>
	layout/base/nsCSSFrameConstructor.cpp in the browser engine in Mozilla Firefox 3.0.x before 3.0.15 does not properly handle first-letter frames, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3383</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3383" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 465a24b33c89591935093ce2f999824f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055963" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055964" comment="python-xpcom190 less than 1.9.0.15-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 97e3d820850fcfc5d0f11f5006eb7f29 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
		</criteria>
	</criteria>
	<!-- a105139fcdfd8a2d443ee7ac045f2e46 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055908" comment="MozillaFirefox-translations less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055909" comment="MozillaFirefox less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055910" comment="mozilla-xulrunner191-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055911" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055912" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055913" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055914" comment="mozilla-xulrunner191-translations less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055915" comment="mozilla-xulrunner191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055916" comment="MozillaFirefox-branding-upstream less than 3.5.4-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055917" comment="mozilla-xulrunner191-devel less than 1.9.1.4-2.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055918" comment="python-xpcom191 less than 1.9.1.4-2.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b45a97409a57ffb7bfed2096ba136e83 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055919" comment="mozilla-xulrunner190-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055920" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055921" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055922" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055923" comment="mozilla-xulrunner190-translations less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055924" comment="mozilla-xulrunner190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009055925" comment="mozilla-xulrunner190-devel less than 1.9.0.15-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009055926" comment="python-xpcom190 less than 1.9.0.15-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3388</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3388" source="CVE"/>
	<description>
	liboggplay in Mozilla Firefox 3.5.x before 3.5.6 and SeaMonkey before 2.0.1 might allow context-dependent attackers to cause a denial of service (application crash) or execute arbitrary code via unspecified vectors, related to "memory safety issues."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3389</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3389" source="CVE"/>
	<description>
	Integer overflow in libtheora in Xiph.Org Theora before 1.1, as used in Mozilla Firefox 3.5 before 3.5.6 and SeaMonkey before 2.0.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a video with large dimensions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3546</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3546" source="CVE"/>
	<description>
	The _gdGetColors function in gd_gd.c in PHP 5.2.11 and 5.3.x before 5.3.1, and the GD Graphics Library 2.x, does not properly verify a certain colorsTotal structure member, which might allow remote attackers to conduct buffer overflow or buffer over-read attacks via a crafted GD file, a different vulnerability than CVE-2009-3293. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3547" source="CVE"/>
	<description>
	Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2cf3d40457c9435953c26b8e74c24432 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056151" comment="kernel-iseries64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056153" comment="kernel-ppc64 less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- 2d7fb81cd7eea9be510d7a1a24ac77c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 4d39ec6d8748e038ab04a0b27f7382a1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056156" comment="kernel-bigsmp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056161" comment="kernel-kdumppae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056162" comment="kernel-vmi less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056163" comment="kernel-vmipae less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056159" comment="kernel-xenpae less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5fb2b55e46097825cba505848cb839cb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
		</criteria></criteria>
	<!-- b1d2dae366b809eaadae10c9e6f31ea1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
	</criteria>
	<!-- b7e0a3a4762fed8e2796b6c6a47318da -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
		</criteria>
	</criteria>
	<!-- bf7b53d62cb6acefb16bcc6d4d6f5a8d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056102" comment="kernel-xenpae less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- d151951fc3a1ac532d4cf09cdcf83600 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056092" comment="kernel-debug less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056097" comment="kernel-kdump less than 2.6.16.60-0.42.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056101" comment="kernel-xen less than 2.6.16.60-0.42.7"/>
		</criteria>
	</criteria>
	<!-- ddf0cfe0200a78301be8b1d7b78fb645 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056150" comment="kernel-default less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056157" comment="kernel-smp less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056154" comment="kernel-source less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056155" comment="kernel-syms less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056160" comment="kernel-debug less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056152" comment="kernel-kdump less than 2.6.16.60-0.57.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056158" comment="kernel-xen less than 2.6.16.60-0.57.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3549" source="CVE"/>
	<description>
	packet-paltalk.c in the Paltalk dissector in Wireshark 1.2.0 through 1.2.2, on SPARC and certain other platforms, allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0417f6ab47e0cc6042fa19e603c81608 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056452" comment="ethereal less than 0.10.14-16.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
		</criteria></criteria>
	<!-- f47d07c215d229cde681685fa9a9e5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056459" comment="ethereal-devel less than 0.10.14-16.40.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3550" source="CVE"/>
	<description>
	The DCERPC/NT dissector in Wireshark 0.10.10 through 1.0.9 and 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a file that records a malformed packet trace.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0417f6ab47e0cc6042fa19e603c81608 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056452" comment="ethereal less than 0.10.14-16.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
		</criteria></criteria>
	<!-- f47d07c215d229cde681685fa9a9e5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056459" comment="ethereal-devel less than 0.10.14-16.40.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3551" source="CVE"/>
	<description>
	Off-by-one error in the dissect_negprot_response function in packet-smb.c in the SMB dissector in Wireshark 1.2.0 through 1.2.2 allows remote attackers to cause a denial of service (application crash) via a file that records a malformed packet trace.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0417f6ab47e0cc6042fa19e603c81608 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056452" comment="ethereal less than 0.10.14-16.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056453" comment="ethereal-devel less than 0.10.14-16.39.1"/>
		</criteria></criteria>
	<!-- f47d07c215d229cde681685fa9a9e5e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056459" comment="ethereal-devel less than 0.10.14-16.40.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2009-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555" source="CVE"/>
	<description>
	The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a "plaintext injection" attack, aka the "Project Mogul" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 045df4135757c0ab62aa79c2419c1dad -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059228" comment="openssl-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059232" comment="openssl-64bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059229" comment="openssl-devel-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059233" comment="openssl-devel-64bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059230" comment="openssl-devel less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059234" comment="openssl-doc less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059235" comment="openssl-x86 less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059231" comment="openssl less than 0.9.8a-18.42.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059228" comment="openssl-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059229" comment="openssl-devel-32bit less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059230" comment="openssl-devel less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059234" comment="openssl-doc less than 0.9.8a-18.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059231" comment="openssl less than 0.9.8a-18.42.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059234" comment="openssl-doc less than 0.9.8a-18.42.2"/>
		</criteria></criteria>
	<!-- 0ff2155181ac30f960d6d4ca838248bd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060882" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.4-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060883" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.4-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060884" comment="java-1_4_2-ibm less than 1.4.2_sr13.4-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060882" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.4-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060884" comment="java-1_4_2-ibm less than 1.4.2_sr13.4-1.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 42a2ec8b7a7f71481933a3bbf882eec5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059549" comment="mozilla-nspr-32bit less than 4.8.2-1.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059550" comment="mozilla-nspr-devel less than 4.8.2-1.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059551" comment="mozilla-nspr less than 4.8.2-1.5.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059552" comment="mozilla-nss-32bit less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059553" comment="mozilla-nss-devel less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059555" comment="mozilla-nss less than 3.12.6-3.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059554" comment="mozilla-nss-tools less than 3.12.6-3.4.1"/>
		</criteria></criteria>
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 51e57ecf5ce9b970237d90e5ee4acd5e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059552" comment="mozilla-nss-32bit less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059561" comment="mozilla-nss-32bit less than 3.12.6-3.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059559" comment="mozilla-nss-64bit less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059553" comment="mozilla-nss-devel less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059560" comment="mozilla-nss-x86 less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059555" comment="mozilla-nss less than 3.12.6-3.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059552" comment="mozilla-nss-32bit less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059553" comment="mozilla-nss-devel less than 3.12.6-3.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059555" comment="mozilla-nss less than 3.12.6-3.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059554" comment="mozilla-nss-tools less than 3.12.6-3.4.1"/>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 6deef59a2e94ee7d0f87aa2f497078c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
		</criteria>
	</criteria>
	<!-- 7296a09b7cd71335b7d466c822ef3e7b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065651" comment="gnutls-32bit less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065655" comment="gnutls-64bit less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065652" comment="gnutls-devel-32bit less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065656" comment="gnutls-devel-64bit less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065653" comment="gnutls-devel less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065657" comment="gnutls-x86 less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065654" comment="gnutls less than 1.2.10-13.26.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065651" comment="gnutls-32bit less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065652" comment="gnutls-devel-32bit less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065653" comment="gnutls-devel less than 1.2.10-13.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065654" comment="gnutls less than 1.2.10-13.26.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 78caf50c2261c865e06e92ff68d948da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
	<!-- aa66d8843925bd9511841d6ad82f49c1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056273" comment="openssl-doc less than 0.9.8a-18.39.1"/>
	</criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b983aa73d822e89c7b49b150b10a8cab -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059236" comment="openssl-32bit less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059237" comment="openssl-devel-32bit less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059238" comment="openssl-devel less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059242" comment="openssl-doc less than 0.9.8a-18.39.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059239" comment="openssl less than 0.9.8a-18.39.6"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059242" comment="openssl-doc less than 0.9.8a-18.39.6"/>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c061b25f20728b088a7357bd5622663c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056263" comment="compat-openssl097g-32bit less than 0.9.7g-13.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056265" comment="compat-openssl097g-64bit less than 0.9.7g-13.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056266" comment="compat-openssl097g-x86 less than 0.9.7g-13.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056264" comment="compat-openssl097g less than 0.9.7g-13.19.1"/>
		</criteria>
	</criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f99093a5bf235f2d2471722a946414f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056267" comment="openssl-32bit less than 0.9.8a-18.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056271" comment="openssl-64bit less than 0.9.8a-18.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056268" comment="openssl-devel-32bit less than 0.9.8a-18.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056272" comment="openssl-devel-64bit less than 0.9.8a-18.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056269" comment="openssl-devel less than 0.9.8a-18.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056273" comment="openssl-doc less than 0.9.8a-18.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056274" comment="openssl-x86 less than 0.9.8a-18.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056270" comment="openssl less than 0.9.8a-18.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056273" comment="openssl-doc less than 0.9.8a-18.39.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3556</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3556" source="CVE"/>
	<description>
	A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e38893ae48531c465e75bb476887271 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057699" comment="kernel-xenpae less than 2.6.16.60-0.42.9"/>
		</criteria>
	</criteria>
	<!-- 30110847005ad3a7ea7c5d1efd067ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 44be42f54c5e35e6e551e68351bbd0e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059220" comment="kernel-bigsmp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059222" comment="kernel-kdumppae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059223" comment="kernel-vmi less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059224" comment="kernel-vmipae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a90bbd78c61a210fcbf21c821ac1ec8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057694" comment="kernel-default less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057695" comment="kernel-smp less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057696" comment="kernel-source less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057697" comment="kernel-syms less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			</criteria>
		</criteria></criteria>
	<!-- 8e541b7f2bfe8694ff60329a4b87780b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
	</criteria>
	<!-- 9a1d7bed362eab0ffb8a1cfcb944439e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059204" comment="kernel-iseries64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059206" comment="kernel-ppc64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
	<!-- a02e6340cd8b95ceba636634ae907750 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
	</criteria>
	<!-- d5a23ca2612948125ba212f86484077b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
		</criteria>
	</criteria>
	<!-- ffb169f8e0b809058bff6cb318c6a511 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560" source="CVE"/>
	<description>
	The big2_toUtf8 function in lib/xmltok.c in libexpat in Expat 2.0.1, as used in the XML-Twig module for Perl, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with malformed UTF-8 sequences that trigger a buffer over-read, related to the doProlog function in lib/xmlparse.c, a different vulnerability than CVE-2009-2625 and CVE-2009-3720.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02b44ddad8ad9e7b92ad9f13e92a601f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060286" comment="libicecore-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060281" comment="libicecore less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060287" comment="libiiclib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060282" comment="libiiclib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060288" comment="libiksemel-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060283" comment="libiksemel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060289" comment="libnetlib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060284" comment="libnetlib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060290" comment="libxmlrpc-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060285" comment="libxmlrpc less than 1.0.8-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 2bf3d4d93bd78d8c4ba85f2b470302a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060392" comment="python-32bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060399" comment="python-64bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060393" comment="python-curses less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060395" comment="python-gdbm less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060396" comment="python-tk less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060402" comment="python-x86 less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060397" comment="python-xml less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060398" comment="python less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060392" comment="python-32bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060393" comment="python-curses less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060395" comment="python-gdbm less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060396" comment="python-tk less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060397" comment="python-xml less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060398" comment="python less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2e633ac53e145fe980b1672ed0d9450f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057235" comment="expat-32bit less than 2.0.0-13.7.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057236" comment="expat less than 2.0.0-13.7.5"/>
		</criteria>
	</criteria>
	<!-- 3639bd4a9da276a1b1610f2fa05250fe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056875" comment="pyxml less than 0.8.4-17.9.1"/>
	</criteria>
	<!-- 4b6a98144b056338e16faebd4e808fd6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060286" comment="libicecore-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060281" comment="libicecore less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060287" comment="libiiclib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060282" comment="libiiclib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060288" comment="libiksemel-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060283" comment="libiksemel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060289" comment="libnetlib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060284" comment="libnetlib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060290" comment="libxmlrpc-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060285" comment="libxmlrpc less than 1.0.8-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 820bf995b0b8ef652938ed9ac02c7290 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057249" comment="expat-32bit less than 2.0.0-13.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057251" comment="expat-64bit less than 2.0.0-13.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057252" comment="expat-x86 less than 2.0.0-13.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057250" comment="expat less than 2.0.0-13.9.1"/>
		</criteria>
	</criteria>
	<!-- ec0e6b56bef3a2f0abbec9124426a667 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056853" comment="expat-32bit less than 2.0.0-13.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056855" comment="expat-64bit less than 2.0.0-13.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056856" comment="expat-x86 less than 2.0.0-13.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056854" comment="expat less than 2.0.0-13.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3563" source="CVE"/>
	<description>
	ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 39d7f6479e7aef00dbc4f8ce26d76d22 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059506" comment="xntp-doc less than 4.2.4p3-48.13.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059505" comment="xntp less than 4.2.4p3-48.13.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059506" comment="xntp-doc less than 4.2.4p3-48.13.5"/>
		</criteria></criteria>
	<!-- a60f56a5cbd62094d9b3667468cfec91 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056881" comment="xntp-doc less than 4.2.4p3-48.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056880" comment="xntp less than 4.2.4p3-48.15.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056881" comment="xntp-doc less than 4.2.4p3-48.15.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3603</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3603" source="CVE"/>
	<description>
	Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2009-1188.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01e421e6519d244d81039826583906d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056062" comment="xpdf less than 3.01-21.22.2"/>
	</criteria>
	<!-- ec68168613114b71d4f75d36708a4550 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056063" comment="xpdf-tools less than 3.01-21.23.2"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056064" comment="xpdf less than 3.01-21.23.2"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3604</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3604" source="CVE"/>
	<description>
	The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF, does not properly allocate memory, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document that triggers a NULL pointer dereference or a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01e421e6519d244d81039826583906d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056062" comment="xpdf less than 3.01-21.22.2"/>
	</criteria>
	<!-- ec68168613114b71d4f75d36708a4550 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056063" comment="xpdf-tools less than 3.01-21.23.2"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056064" comment="xpdf less than 3.01-21.23.2"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3605</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3605" source="CVE"/>
	<description>
	Multiple integer overflows in Poppler 0.10.5 and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, related to (1) glib/poppler-page.cc; (2) ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5) JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10) SplashFTFont.cc in splash/.  NOTE: this may overlap CVE-2009-0791.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01e421e6519d244d81039826583906d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056062" comment="xpdf less than 3.01-21.22.2"/>
	</criteria>
	<!-- ec68168613114b71d4f75d36708a4550 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056063" comment="xpdf-tools less than 3.01-21.23.2"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056064" comment="xpdf less than 3.01-21.23.2"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3606</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3606" source="CVE"/>
	<description>
	Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01e421e6519d244d81039826583906d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056062" comment="xpdf less than 3.01-21.22.2"/>
	</criteria>
	<!-- ec68168613114b71d4f75d36708a4550 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056063" comment="xpdf-tools less than 3.01-21.23.2"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056064" comment="xpdf less than 3.01-21.23.2"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3608</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3608" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3608" source="CVE"/>
	<description>
	Integer overflow in the ObjectStream::ObjectStream function in XRef.cc in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote attackers to execute arbitrary code via a crafted PDF document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01e421e6519d244d81039826583906d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056062" comment="xpdf less than 3.01-21.22.2"/>
	</criteria>
	<!-- 7d2f582d2bec27801571ff8a401834e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059508" comment="poppler-glib less than 0.4.4-19.25"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059509" comment="poppler-qt less than 0.4.4-19.25"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059510" comment="poppler less than 0.4.4-19.25"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059507" comment="poppler-devel less than 0.4.4-19.25"/>
		</criteria></criteria>
	<!-- acb3f6410ae6c78670cfcceb8a8c1b20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056247" comment="kdegraphics3-pdf less than 3.5.1-23.26.1"/>
	</criteria>
	<!-- e853ec612aaf89b8d57a41b0d2317728 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057082" comment="poppler-glib less than 0.4.4-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057083" comment="poppler-qt less than 0.4.4-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057084" comment="poppler less than 0.4.4-19.26.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057081" comment="poppler-devel less than 0.4.4-19.26.1"/>
		</criteria></criteria>
	<!-- ec68168613114b71d4f75d36708a4550 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056063" comment="xpdf-tools less than 3.01-21.23.2"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056064" comment="xpdf less than 3.01-21.23.2"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3609</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3609" source="CVE"/>
	<description>
	Integer overflow in the ImageStream::ImageStream function in Stream.cc in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf, kdegraphics KPDF, and CUPS pdftops, allows remote attackers to cause a denial of service (application crash) via a crafted PDF document that triggers a NULL pointer dereference or buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01e421e6519d244d81039826583906d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056062" comment="xpdf less than 3.01-21.22.2"/>
	</criteria>
	<!-- 122c057e02d061564f0267deea6afc4f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056929" comment="cups-client less than 1.1.23-40.57.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056930" comment="cups-devel less than 1.1.23-40.57.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056931" comment="cups-libs-32bit less than 1.1.23-40.57.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056932" comment="cups-libs less than 1.1.23-40.57.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056933" comment="cups less than 1.1.23-40.57.2"/>
		</criteria>
	</criteria>
	<!-- acb3f6410ae6c78670cfcceb8a8c1b20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056247" comment="kdegraphics3-pdf less than 3.5.1-23.26.1"/>
	</criteria>
	<!-- d08f63f2bc0b4ca434e47aa9eb4c37c4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056936" comment="cups-client less than 1.1.23-40.59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056937" comment="cups-devel less than 1.1.23-40.59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056938" comment="cups-libs-32bit less than 1.1.23-40.59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056941" comment="cups-libs-64bit less than 1.1.23-40.59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056942" comment="cups-libs-x86 less than 1.1.23-40.59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056939" comment="cups-libs less than 1.1.23-40.59.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056940" comment="cups less than 1.1.23-40.59.8"/>
		</criteria>
	</criteria>
	<!-- ec68168613114b71d4f75d36708a4550 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056063" comment="xpdf-tools less than 3.01-21.23.2"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056064" comment="xpdf less than 3.01-21.23.2"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3612</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3612" source="CVE"/>
	<description>
	The tcf_fill_node function in net/sched/cls_api.c in the netlink subsystem in the Linux kernel 2.6.x before 2.6.32-rc5, and 2.4.37.6 and earlier, does not initialize a certain tcm__pad2 structure member, which might allow local users to obtain sensitive information from kernel memory via unspecified vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2005-4881.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3613</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3613" source="CVE"/>
	<description>
	The swiotlb functionality in the r8169 driver in drivers/net/r8169.c in the Linux kernel before 2.6.27.22 allows remote attackers to cause a denial of service (IOMMU space exhaustion and system crash) by using jumbo frames for a large amount of network traffic, as demonstrated by a flood ping.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3615</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3615" source="CVE"/>
	<description>
	The OSCAR protocol plugin in libpurple in Pidgin before 2.6.3 and Adium before 1.3.7 allows remote attackers to cause a denial of service (application crash) via crafted contact-list data for (1) ICQ and possibly (2) AIM, as demonstrated by the SIM IM client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d28df07e249dc388685ce92f96c4b80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056811" comment="finch-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056808" comment="finch less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056812" comment="libpurple-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056809" comment="libpurple less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056813" comment="pidgin-devel less than 2.6.3-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056810" comment="pidgin less than 2.6.3-0.4.2"/>
		</criteria>
	</criteria>
	<!-- 9b89dca2177efa5da444e8dfb83b1662 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056817" comment="finch-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056814" comment="finch less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056818" comment="libpurple-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056815" comment="libpurple less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056819" comment="pidgin-devel less than 2.6.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056816" comment="pidgin less than 2.6.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093620" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3620</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3620" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3620" source="CVE"/>
	<description>
	The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3621</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3621" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3621" source="CVE"/>
	<description>
	net/unix/af_unix.c in the Linux kernel 2.6.31.4 and earlier allows local users to cause a denial of service (system hang) by creating an abstract-namespace AF_UNIX listening socket, performing a shutdown operation on this socket, and then performing a series of connect operations to this socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3627</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3627" source="CVE"/>
	<description>
	The decode_entities function in util.c in HTML-Parser before 3.63 allows context-dependent attackers to cause a denial of service (infinite loop) via an incomplete SGML numeric character reference, which triggers generation of an invalid UTF-8 character.
	</description>
 </metadata>
<!-- c1fba3f81350b7a36c5028892ca260fc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009056805" comment="perl-HTML-Parser less than 3.48-12.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3720</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720" source="CVE"/>
	<description>
	The updatePosition function in lib/xmltok_impl.c in libexpat in Expat 2.0.1, as used in Python, PyXML, w3c-libwww, and other software, allows context-dependent attackers to cause a denial of service (application crash) via an XML document with crafted UTF-8 sequences that trigger a buffer over-read, a different vulnerability than CVE-2009-2625.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02b44ddad8ad9e7b92ad9f13e92a601f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060286" comment="libicecore-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060281" comment="libicecore less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060287" comment="libiiclib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060282" comment="libiiclib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060288" comment="libiksemel-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060283" comment="libiksemel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060289" comment="libnetlib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060284" comment="libnetlib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060290" comment="libxmlrpc-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060285" comment="libxmlrpc less than 1.0.8-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 2bf3d4d93bd78d8c4ba85f2b470302a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060392" comment="python-32bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060399" comment="python-64bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060393" comment="python-curses less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060395" comment="python-gdbm less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060396" comment="python-tk less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060402" comment="python-x86 less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060397" comment="python-xml less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060398" comment="python less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060392" comment="python-32bit less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060393" comment="python-curses less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060395" comment="python-gdbm less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060396" comment="python-tk less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060397" comment="python-xml less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060398" comment="python less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060400" comment="python-demo less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060394" comment="python-devel less than 2.4.2-18.29.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060401" comment="python-idle less than 2.4.2-18.29.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 3639bd4a9da276a1b1610f2fa05250fe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056875" comment="pyxml less than 0.8.4-17.9.1"/>
	</criteria>
	<!-- 4b6a98144b056338e16faebd4e808fd6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060286" comment="libicecore-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060281" comment="libicecore less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060287" comment="libiiclib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060282" comment="libiiclib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060288" comment="libiksemel-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060283" comment="libiksemel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060289" comment="libnetlib-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060284" comment="libnetlib less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060290" comment="libxmlrpc-devel less than 1.0.8-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060285" comment="libxmlrpc less than 1.0.8-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f94e65884b9f736b165e780f6ebf1e36 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056341" comment="expat-32bit less than 2.0.0-13.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056343" comment="expat-64bit less than 2.0.0-13.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056344" comment="expat-x86 less than 2.0.0-13.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056342" comment="expat less than 2.0.0-13.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3726</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3726" source="CVE"/>
	<description>
	The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3736</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3736" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3736" source="CVE"/>
	<description>
	ltdl.c in libltdl in GNU Libtool 1.5.x, and 2.2.6 before 2.2.6b, as used in Ham Radio Control Libraries, Q, and possibly other products, attempts to open a .la file in the current working directory, which allows local users to gain privileges via a Trojan horse file.
	</description>
 </metadata>
<!-- 1232434f1a9adbb5ef92fe6f2b438090 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057125" comment="libtool-32bit less than 1.5.22-13.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057127" comment="libtool-64bit less than 1.5.22-13.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057128" comment="libtool-x86 less than 1.5.22-13.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057126" comment="libtool less than 1.5.22-13.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3743</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3743" source="CVE"/>
	<description>
	Off-by-one error in the Ins_MINDEX function in the TrueType bytecode interpreter in Ghostscript before 8.71 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a malformed TrueType font in a document that trigger an integer overflow and a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ed33b07c67b3e3c685b564c2b6d267ec -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073813" comment="ghostscript-fonts-other less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073818" comment="ghostscript-fonts-rus less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073814" comment="ghostscript-fonts-std less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073815" comment="ghostscript-library less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073819" comment="ghostscript-omni less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073816" comment="ghostscript-x11 less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073820" comment="libgimpprint-devel less than 4.2.7-62.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073817" comment="libgimpprint less than 4.2.7-62.14.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073818" comment="ghostscript-fonts-rus less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073819" comment="ghostscript-omni less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073820" comment="libgimpprint-devel less than 4.2.7-62.14.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3867</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3867" source="CVE"/>
	<description>
	Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
	<!-- e795156a7d22625d0cc4c8c424474b9d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057182" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f558fc6a0e3ea683889ee8d14ceac1b3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3868</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3868" source="CVE"/>
	<description>
	Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 47c718d1829393ab9c39c157cdcb2ebb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 67b3a6732def288d5f612be0e3a0ab30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056380" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3869</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3869" source="CVE"/>
	<description>
	Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
	<!-- e795156a7d22625d0cc4c8c424474b9d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057182" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f558fc6a0e3ea683889ee8d14ceac1b3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3871</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3871" source="CVE"/>
	<description>
	Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
	<!-- e795156a7d22625d0cc4c8c424474b9d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057182" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f558fc6a0e3ea683889ee8d14ceac1b3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3872</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3872" source="CVE"/>
	<description>
	Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 47c718d1829393ab9c39c157cdcb2ebb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 67b3a6732def288d5f612be0e3a0ab30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056380" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3873</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3873" source="CVE"/>
	<description>
	The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a "quantization problem," aka Bug Id 6862968.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 47c718d1829393ab9c39c157cdcb2ebb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 67b3a6732def288d5f612be0e3a0ab30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056380" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3874</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3874" source="CVE"/>
	<description>
	Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
	<!-- e795156a7d22625d0cc4c8c424474b9d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057182" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f558fc6a0e3ea683889ee8d14ceac1b3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3875</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3875" source="CVE"/>
	<description>
	The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to "timing attack vulnerabilities," aka Bug Id 6863503.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
	<!-- e795156a7d22625d0cc4c8c424474b9d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057182" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.3-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f558fc6a0e3ea683889ee8d14ceac1b3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057180" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057181" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.3-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057183" comment="java-1_4_2-ibm less than 1.4.2_sr13.3-1.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3876</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3876" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 47c718d1829393ab9c39c157cdcb2ebb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 67b3a6732def288d5f612be0e3a0ab30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056380" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3877</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3877" source="CVE"/>
	<description>
	Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1cb95aa32e0a2fbde417e5060b29d0ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057145" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057146" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057149" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057150" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057151" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057155" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 47c718d1829393ab9c39c157cdcb2ebb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- 67b3a6732def288d5f612be0e3a0ab30 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056377" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056378" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056380" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056379" comment="java-1_4_2-ibm less than 1.4.2_sr13.2-0.4.1"/>
		</criteria>
	</criteria>
	<!-- af469401da197afd4006ef4ae0c61aaa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057019" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057029" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057020" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057022" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057023" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057024" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057025" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057026" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11-0.4.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057028" comment="java-1_5_0-ibm less than 1.5.0_sr11-0.4.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3889</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3889" source="CVE"/>
	<description>
	The dbg_lvl file for the megaraid_sas driver in the Linux kernel before 2.6.27 has world-writable permissions, which allows local users to change the (1) behavior and (2) logging level of the driver by modifying this file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3909</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3909" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3909" source="CVE"/>
	<description>
	Integer overflow in the read_channel_data function in plug-ins/file-psd/psd-load.c in GIMP 2.6.7 might allow remote attackers to execute arbitrary code via a crafted PSD file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 81784b1af32c10a70030409d240c5d5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059677" comment="gimp less than 2.2.10-22.33.1"/>
	</criteria>
	<!-- 8898f86dd0b585356643c2317b17508f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059678" comment="gimp-devel less than 2.2.10-22.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059679" comment="gimp-devel less than 2.2.10-22.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059680" comment="gimp less than 2.2.10-22.32"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059677" comment="gimp less than 2.2.10-22.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3939</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3939" source="CVE"/>
	<description>
	The poll_mode_io file for the megaraid_sas driver in the Linux kernel 2.6.31.6 and earlier has world-writable permissions, which allows local users to change the I/O mode of the driver by modifying this file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3978</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3978" source="CVE"/>
	<description>
	The nsGIFDecoder2::GifWrite function in decoders/gif/nsGIFDecoder2.cpp in libpr0n in Mozilla Firefox before 3.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an animated GIF file with a large image size, a different vulnerability than CVE-2009-3373.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 258489d1ca2f5df4067da7db0af065b8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056361" comment="MozillaFirefox-branding-upstream less than 3.5.5-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056362" comment="mozilla-xulrunner191-devel less than 1.9.1.5-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056363" comment="python-xpcom191 less than 1.9.1.5-1.4.1"/>
		</criteria>
	</criteria>
	<!-- 3491c1762db63fb4f81a16754561e6b1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056353" comment="MozillaFirefox-translations less than 3.5.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056354" comment="MozillaFirefox less than 3.5.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056355" comment="mozilla-xulrunner191-32bit less than 1.9.1.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056356" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056357" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056358" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056359" comment="mozilla-xulrunner191-translations less than 1.9.1.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056360" comment="mozilla-xulrunner191 less than 1.9.1.5-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056361" comment="MozillaFirefox-branding-upstream less than 3.5.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056362" comment="mozilla-xulrunner191-devel less than 1.9.1.5-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056363" comment="python-xpcom191 less than 1.9.1.5-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3979</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3979" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 38f2e3bf80d291ec111cc852e32a75f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7d3bda1571135bc5129afbe4d0dde824 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3980</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3980" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3981</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3981" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox before 3.0.16, SeaMonkey before 2.0.1, and Thunderbird allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 38f2e3bf80d291ec111cc852e32a75f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7d3bda1571135bc5129afbe4d0dde824 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3982</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3982" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.6, SeaMonkey before 2.0.1, and Thunderbird allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3983</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3983" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to send authenticated requests to arbitrary applications by replaying the NTLM credentials of a browser user.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 38f2e3bf80d291ec111cc852e32a75f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7d3bda1571135bc5129afbe4d0dde824 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3984</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3984" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to spoof an SSL indicator for an http URL or a file URL by setting document.location to an https URL corresponding to a site that responds with a No Content (aka 204) status code and an empty body.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 38f2e3bf80d291ec111cc852e32a75f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7d3bda1571135bc5129afbe4d0dde824 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3985</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3985" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to associate spoofed content with an invalid URL by setting document.location to this URL, and then writing arbitrary web script or HTML to the associated blank document, a related issue to CVE-2009-2654.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 38f2e3bf80d291ec111cc852e32a75f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7d3bda1571135bc5129afbe4d0dde824 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3986</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3986" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.16 and 3.5.x before 3.5.6, and SeaMonkey before 2.0.1, allows remote attackers to execute arbitrary JavaScript with chrome privileges by leveraging a reference to a chrome window from a content window, related to the window.opener property.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2f608be689872233c5fce2ce26bd4514 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 38f2e3bf80d291ec111cc852e32a75f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7d3bda1571135bc5129afbe4d0dde824 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056945" comment="mozilla-xulrunner190-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056946" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056947" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056948" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056949" comment="mozilla-xulrunner190-translations less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056950" comment="mozilla-xulrunner190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056951" comment="mozilla-xulrunner190-devel less than 1.9.0.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056952" comment="python-xpcom190 less than 1.9.0.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 94479865c30ad91f8d95908c3644ba93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056915" comment="MozillaFirefox-translations less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056916" comment="MozillaFirefox less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056917" comment="mozilla-xulrunner191-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056918" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056919" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056920" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056921" comment="mozilla-xulrunner191-translations less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056922" comment="mozilla-xulrunner191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056923" comment="MozillaFirefox-branding-upstream less than 3.5.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056924" comment="mozilla-xulrunner191-devel less than 1.9.1.6-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056925" comment="python-xpcom191 less than 1.9.1.6-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3988</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3988" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly restrict read access to object properties in showModalDialog, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via crafted dialogArguments values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2755cbbc26038704cb28fe5609654649 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 630708f048967bcbe3d7e12e91204fcf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 92493341108c831de901f98149d82c69 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058440" comment="MozillaFirefox-translations less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058441" comment="MozillaFirefox less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058448" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d41075930b3e4dc43019336480f6a248 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058453" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3995</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3995" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via (1) crafted samples or (2) crafted instrument definitions in an Impulse Tracker file.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- a2bdb4e2453c5f8b835512f634e53383 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060140" comment="libmikmod-32bit less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060142" comment="libmikmod-64bit less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060143" comment="libmikmod-x86 less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060141" comment="libmikmod less than 3.1.11-14.10.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060140" comment="libmikmod-32bit less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060141" comment="libmikmod less than 3.1.11-14.10.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20093996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-3996</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-3996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3996" source="CVE"/>
	<description>
	Heap-based buffer overflow in IN_MOD.DLL (aka the Module Decoder Plug-in) in Winamp before 5.57, and libmikmod 3.1.12, might allow remote attackers to execute arbitrary code via an Ultratracker file.
	</description>
 </metadata>
<!-- a2bdb4e2453c5f8b835512f634e53383 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060140" comment="libmikmod-32bit less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060142" comment="libmikmod-64bit less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060143" comment="libmikmod-x86 less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060141" comment="libmikmod less than 3.1.11-14.10.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060140" comment="libmikmod-32bit less than 3.1.11-14.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060141" comment="libmikmod less than 3.1.11-14.10.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4005</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-4005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4005" source="CVE"/>
	<description>
	The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the Linux kernel before 2.6.32-rc7 allows attackers to have an unspecified impact via a crafted HDLC packet that arrives over ISDN and triggers a buffer under-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4017</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4017" source="CVE"/>
	<description>
	PHP before 5.2.12 and 5.3.x before 5.3.1 does not restrict the number of temporary files created when handling a multipart/form-data POST request, which allows remote attackers to cause a denial of service (resource exhaustion), and makes it easier for remote attackers to exploit local file inclusion vulnerabilities, via multiple requests, related to lack of support for the max_file_uploads directive.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4019</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4019" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4019" source="CVE"/>
	<description>
	mysqld in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41 does not (1) properly handle errors during execution of certain SELECT statements with subqueries, and does not (2) preserve certain null_value flags during execution of statements that use the GeomFromWKB function, which allows remote authenticated users to cause a denial of service (daemon crash) via a crafted statement.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 71d78dc72e348aa31062cbc12a65c867 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058927" comment="mysql-bench less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f637910c82f5652219cfb8cf0ba4069f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058936" comment="mysql-bench less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058934" comment="mysql-shared-64bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058935" comment="mysql-shared-x86 less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4020</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4020" source="CVE"/>
	<description>
	Stack-based buffer overflow in the hfs subsystem in the Linux kernel 2.6.32 allows remote attackers to have an unspecified impact via a crafted Hierarchical File System (HFS) filesystem, related to the hfs_readdir function in fs/hfs/dir.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 30110847005ad3a7ea7c5d1efd067ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 37bb490b2d9ca27c1027e09c0453381c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060291" comment="kernel-default less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060294" comment="kernel-smp less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060292" comment="kernel-source less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060293" comment="kernel-syms less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e02dcbe650533bbc5c4aeb6300f0d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060299" comment="kernel-xenpae less than 2.6.16.60-0.42.10"/>
		</criteria>
	</criteria>
	<!-- 44be42f54c5e35e6e551e68351bbd0e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059220" comment="kernel-bigsmp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059222" comment="kernel-kdumppae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059223" comment="kernel-vmi less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059224" comment="kernel-vmipae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 9a1d7bed362eab0ffb8a1cfcb944439e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059204" comment="kernel-iseries64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059206" comment="kernel-ppc64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- d5a23ca2612948125ba212f86484077b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
		</criteria>
	</criteria>
	<!-- e7da2abdeaf19e694fa26d810aaab118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ef2b9d5d6bc17682fa94fd4898564773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ffb169f8e0b809058bff6cb318c6a511 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Realtime 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4021" source="CVE"/>
	<description>
	The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1ed123b7a03b2d98587c4ac69fd24e41 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 1f3d0df322cdf35f54c2baec92610fa0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30de1fffa1acea350d261006806caaef -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009047590" comment="sles10-sp2-rt is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056999" comment="ib-bonding-kmp-rt less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057000" comment="ib-bonding-kmp-rt_bigsmp less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057001" comment="ib-bonding-kmp-rt_debug less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057002" comment="ib-bonding-kmp-rt_timing less than 0.9.0_2.6.22.19_0.35-1.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057003" comment="kernel-rt less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057004" comment="kernel-rt_bigsmp less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057005" comment="kernel-rt_debug less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057006" comment="kernel-rt_timing less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057007" comment="kernel-source less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057008" comment="kernel-syms less than 2.6.22.19-0.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057009" comment="ofed-cxgb3-NIC-kmp-rt less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057010" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057011" comment="ofed-cxgb3-NIC-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057012" comment="ofed-cxgb3-NIC-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057013" comment="ofed-doc less than 1.3-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057014" comment="ofed-kmp-rt less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057015" comment="ofed-kmp-rt_bigsmp less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057016" comment="ofed-kmp-rt_debug less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057017" comment="ofed-kmp-rt_timing less than 1.3_2.6.22.19_0.35-0.33.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057018" comment="ofed less than 1.3-0.33.4"/>
		</criteria>
	</criteria>
	<!-- 3394af4142e32b1fc8e96d64e36d50aa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 49abe3090200555e6b5936a6ebf5473f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
	</criteria>
	<!-- 7a612881db49bcc0dd76d517d881465e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056864" comment="kernel-bigsmp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056866" comment="kernel-kdumppae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056861" comment="kernel-smp less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056867" comment="kernel-vmi less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056868" comment="kernel-vmipae less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056857" comment="kernel-debug less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056862" comment="kernel-xen less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056865" comment="kernel-xenpae less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a69123b02b828a25e53eddc0924dce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056869" comment="kernel-iseries64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056870" comment="kernel-ppc64 less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056863" comment="kernel-kdump less than 2.6.16.60-0.58.1"/>
		</criteria></criteria>
	<!-- 977d4efa1cdb27c85e4ac229d6dad143 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056858" comment="kernel-default less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056859" comment="kernel-source less than 2.6.16.60-0.58.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056860" comment="kernel-syms less than 2.6.16.60-0.58.1"/>
		</criteria>
	</criteria>
	<!-- b3eb24d74bdd653ada797067c8107a34 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009056968" comment="kernel-xenpae less than 2.6.16.60-0.42.8"/>
		</criteria>
	</criteria>
	<!-- d74d39d05b86ecd47749efef4c5cc4da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056958" comment="kernel-default less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056966" comment="kernel-smp less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056962" comment="kernel-source less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056963" comment="kernel-syms less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009056964" comment="kernel-debug less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056960" comment="kernel-kdump less than 2.6.16.60-0.42.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009056967" comment="kernel-xen less than 2.6.16.60-0.42.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4028</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4028" source="CVE"/>
	<description>
	The vio_verify_callback function in viosslfactories.c in MySQL 5.0.x before 5.0.88 and 5.1.x before 5.1.41, when OpenSSL is used, accepts a value of zero for the depth of X.509 certificates, which allows man-in-the-middle attackers to spoof arbitrary SSL-based MySQL servers via a crafted certificate, as demonstrated by a certificate presented by a server linked against the yaSSL library.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 71d78dc72e348aa31062cbc12a65c867 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058927" comment="mysql-bench less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f637910c82f5652219cfb8cf0ba4069f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058936" comment="mysql-bench less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058934" comment="mysql-shared-64bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058935" comment="mysql-shared-x86 less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4030</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4030" source="CVE"/>
	<description>
	MySQL 5.1.x before 5.1.41 allows local users to bypass certain privilege checks by calling CREATE TABLE on a MyISAM table with modified (1) DATA DIRECTORY or (2) INDEX DIRECTORY arguments that are originally associated with pathnames without symlinks, and that can point to tables created at a future time at which a pathname is modified to contain a symlink to a subdirectory of the MySQL data home directory, related to incorrect calculation of the mysql_unpacked_real_data_home value.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4098 and CVE-2008-2079.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 71d78dc72e348aa31062cbc12a65c867 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058927" comment="mysql-bench less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f637910c82f5652219cfb8cf0ba4069f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058936" comment="mysql-bench less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058934" comment="mysql-shared-64bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058935" comment="mysql-shared-x86 less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4034</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-4034" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4034" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1affd8250bdc70c2adb0d16417d75fc6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057305" comment="postgresql-contrib less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057302" comment="postgresql-devel less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057306" comment="postgresql-docs less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057303" comment="postgresql-libs-32bit less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057304" comment="postgresql-libs less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057309" comment="postgresql-pl less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057310" comment="postgresql-server less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057311" comment="postgresql less than 8.1.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057305" comment="postgresql-contrib less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057302" comment="postgresql-devel less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057306" comment="postgresql-docs less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057309" comment="postgresql-pl less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057310" comment="postgresql-server less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057311" comment="postgresql less than 8.1.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3c417b624dd7c9352d811841c176ffe7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057315" comment="postgresql-contrib less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057312" comment="postgresql-devel less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057316" comment="postgresql-docs less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057313" comment="postgresql-libs-32bit less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057317" comment="postgresql-libs-64bit less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057318" comment="postgresql-libs-x86 less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057314" comment="postgresql-libs less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057319" comment="postgresql-pl less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057320" comment="postgresql-server less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057321" comment="postgresql less than 8.1.19-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057315" comment="postgresql-contrib less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057312" comment="postgresql-devel less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057316" comment="postgresql-docs less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057319" comment="postgresql-pl less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057320" comment="postgresql-server less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057321" comment="postgresql less than 8.1.19-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4035</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-4035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4035" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in Xpdf 3.0.0, gpdf 2.8.2, kpdf in kdegraphics 3.3.1, and possibly other libraries and versions, does not check the return value of the getNextLine function, which allows context-dependent attackers to execute arbitrary code via a PDF file with a crafted Type 1 font that can produce a negative value, leading to a signed-to-unsigned integer conversion error and a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d2f582d2bec27801571ff8a401834e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059508" comment="poppler-glib less than 0.4.4-19.25"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059509" comment="poppler-qt less than 0.4.4-19.25"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059510" comment="poppler less than 0.4.4-19.25"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059507" comment="poppler-devel less than 0.4.4-19.25"/>
		</criteria></criteria>
	<!-- e853ec612aaf89b8d57a41b0d2317728 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057082" comment="poppler-glib less than 0.4.4-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057083" comment="poppler-qt less than 0.4.4-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057084" comment="poppler less than 0.4.4-19.26.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057081" comment="poppler-devel less than 0.4.4-19.26.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4067</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-4067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4067" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 169bd714365eb7c38e38540921171d06 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 6253a90635c740c154fb5e3cc64612f2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071616" comment="kernel-bigsmp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071621" comment="kernel-kdumppae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071622" comment="kernel-vmi less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071623" comment="kernel-vmipae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- b1201574824e860419470a1e97bdba2c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
		</criteria>
	</criteria>
	<!-- be6b41cc85222e68513448b61b7af786 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c4377326fa8f6c8c833ef411e531a291 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071624" comment="kernel-iseries64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071625" comment="kernel-ppc64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4134</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4134" source="CVE"/>
	<description>
	Buffer underflow in the rgbimg module in Python 2.5 allows remote attackers to cause a denial of service (application crash) via a large ZSIZE value in a black-and-white (aka B/W) RGB image that triggers an invalid pointer dereference.
	</description>
 </metadata>
<!-- a2098cb2e3d51d63912dc55b837af4c0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065582" comment="python-64bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065585" comment="python-x86 less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4136</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-4136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4136" source="CVE"/>
	<description>
	PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1affd8250bdc70c2adb0d16417d75fc6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057305" comment="postgresql-contrib less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057302" comment="postgresql-devel less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057306" comment="postgresql-docs less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057303" comment="postgresql-libs-32bit less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057304" comment="postgresql-libs less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057309" comment="postgresql-pl less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057310" comment="postgresql-server less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057311" comment="postgresql less than 8.1.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057305" comment="postgresql-contrib less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057302" comment="postgresql-devel less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057306" comment="postgresql-docs less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057309" comment="postgresql-pl less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057310" comment="postgresql-server less than 8.1.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057311" comment="postgresql less than 8.1.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3c417b624dd7c9352d811841c176ffe7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057315" comment="postgresql-contrib less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057312" comment="postgresql-devel less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057316" comment="postgresql-docs less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057313" comment="postgresql-libs-32bit less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057317" comment="postgresql-libs-64bit less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057318" comment="postgresql-libs-x86 less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057314" comment="postgresql-libs less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057319" comment="postgresql-pl less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057320" comment="postgresql-server less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057321" comment="postgresql less than 8.1.19-0.4.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057315" comment="postgresql-contrib less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057312" comment="postgresql-devel less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057316" comment="postgresql-docs less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057319" comment="postgresql-pl less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057320" comment="postgresql-server less than 8.1.19-0.4.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057321" comment="postgresql less than 8.1.19-0.4.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4142</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4142" source="CVE"/>
	<description>
	The htmlspecialchars function in PHP before 5.2.12 does not properly handle (1) overlong UTF-8 sequences, (2) invalid Shift_JIS sequences, and (3) invalid EUC-JP sequences, which allows remote attackers to conduct cross-site scripting (XSS) attacks by placing a crafted byte sequence before a special character.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17403e8f7302725765d42379d717002a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058255" comment="php5-json less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058237" comment="apache2-mod_php5 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058238" comment="php5-bcmath less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058239" comment="php5-bz2 less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058240" comment="php5-calendar less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058241" comment="php5-ctype less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058242" comment="php5-curl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058243" comment="php5-dba less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058244" comment="php5-dbase less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058245" comment="php5-devel less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058246" comment="php5-dom less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058247" comment="php5-exif less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058248" comment="php5-fastcgi less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058249" comment="php5-ftp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058250" comment="php5-gd less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058251" comment="php5-gettext less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058252" comment="php5-gmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058253" comment="php5-iconv less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058254" comment="php5-imap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058256" comment="php5-ldap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058257" comment="php5-mbstring less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058258" comment="php5-mcrypt less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058259" comment="php5-mhash less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058260" comment="php5-mysql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058261" comment="php5-ncurses less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058262" comment="php5-odbc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058263" comment="php5-openssl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058264" comment="php5-pcntl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058265" comment="php5-pdo less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058266" comment="php5-pear less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058267" comment="php5-pgsql less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058268" comment="php5-posix less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058269" comment="php5-pspell less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058270" comment="php5-shmop less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058271" comment="php5-snmp less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058272" comment="php5-soap less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058273" comment="php5-sockets less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058274" comment="php5-sqlite less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058275" comment="php5-suhosin less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058276" comment="php5-sysvmsg less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058277" comment="php5-sysvsem less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058278" comment="php5-sysvshm less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058285" comment="php5-tidy less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058279" comment="php5-tokenizer less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058280" comment="php5-wddx less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058281" comment="php5-xmlreader less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058282" comment="php5-xmlrpc less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058283" comment="php5-xsl less than 5.2.5-9.25.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058284" comment="php5-zlib less than 5.2.5-9.25.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e9ee08fa47785a2c73ab9791382c4e50 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058312" comment="php5-json less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058294" comment="apache2-mod_php5 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058295" comment="php5-bcmath less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058296" comment="php5-bz2 less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058297" comment="php5-calendar less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058298" comment="php5-ctype less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058299" comment="php5-curl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058300" comment="php5-dba less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058301" comment="php5-dbase less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058302" comment="php5-devel less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058303" comment="php5-dom less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058304" comment="php5-exif less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058305" comment="php5-fastcgi less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058306" comment="php5-ftp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058307" comment="php5-gd less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058308" comment="php5-gettext less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058309" comment="php5-gmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058310" comment="php5-iconv less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058311" comment="php5-imap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058313" comment="php5-ldap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058314" comment="php5-mbstring less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058315" comment="php5-mcrypt less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058316" comment="php5-mhash less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058317" comment="php5-mysql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058318" comment="php5-ncurses less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058319" comment="php5-odbc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058320" comment="php5-openssl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058321" comment="php5-pcntl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058322" comment="php5-pdo less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058323" comment="php5-pear less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058324" comment="php5-pgsql less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058325" comment="php5-posix less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058326" comment="php5-pspell less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058327" comment="php5-shmop less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058328" comment="php5-snmp less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058329" comment="php5-soap less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058330" comment="php5-sockets less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058331" comment="php5-sqlite less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058332" comment="php5-suhosin less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058333" comment="php5-sysvmsg less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058334" comment="php5-sysvsem less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058335" comment="php5-sysvshm less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058342" comment="php5-tidy less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058336" comment="php5-tokenizer less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058337" comment="php5-wddx less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058338" comment="php5-xmlreader less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058339" comment="php5-xmlrpc less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058340" comment="php5-xsl less than 5.2.5-9.23.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058341" comment="php5-zlib less than 5.2.5-9.23.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4212</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4212" source="CVE"/>
	<description>
	Multiple integer underflows in the (1) AES and (2) RC4 decryption functionality in the crypto library in MIT Kerberos 5 (aka krb5) 1.3 through 1.6.3, and 1.7 before 1.7.1, allow remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by providing ciphertext with a length that is too short to be valid.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1b314433d001fbc44480d69334488081 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057380" comment="krb5-32bit less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057386" comment="krb5-apps-clients less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057387" comment="krb5-apps-servers less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057381" comment="krb5-client less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057382" comment="krb5-devel-32bit less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057383" comment="krb5-devel less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057389" comment="krb5-server less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057384" comment="krb5 less than 1.4.3-19.43.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057386" comment="krb5-apps-clients less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057387" comment="krb5-apps-servers less than 1.4.3-19.43.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057389" comment="krb5-server less than 1.4.3-19.43.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 1bedaaa888e968a71e801332958567ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057391" comment="krb5-32bit less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057396" comment="krb5-64bit less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057397" comment="krb5-apps-clients less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057398" comment="krb5-apps-servers less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057392" comment="krb5-client less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057393" comment="krb5-devel-32bit less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057399" comment="krb5-devel-64bit less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057394" comment="krb5-devel less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057400" comment="krb5-server less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057401" comment="krb5-x86 less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057395" comment="krb5 less than 1.4.3-19.44.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057397" comment="krb5-apps-clients less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057398" comment="krb5-apps-servers less than 1.4.3-19.44.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057400" comment="krb5-server less than 1.4.3-19.44.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4214</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4214" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the strip_tags function in Ruby on Rails before 2.2.s, and 2.3.x before 2.3.5, allows remote attackers to inject arbitrary web script or HTML via vectors involving non-printing ASCII characters, related to HTML::Tokenizer and actionpack/lib/action_controller/vendor/html-scanner/html/node.rb.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27f6dec66fef609cc15f47c78edbc6e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058392" comment="rubygem-actionpack-2_0 less than 2.0.2-0.8.2"/>
	</criteria>
	<!-- 5a1747eaf95d5d08c71e444e9e421c5e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058393" comment="rubygem-actionpack-2_0 less than 2.0.2-0.9.1"/>
	</criteria>
	<!-- 8027c68b99bf4c76b11312aac61761a1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058552" comment="rubygem-actionpack-1_12 less than 1.12.5-0.8.1"/>
	</criteria>
	<!-- e8970960ac443d55e0cf891629855ea9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058552" comment="rubygem-actionpack-1_12 less than 1.12.5-0.8.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4274</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4274" source="CVE"/>
	<description>
	Stack-based buffer overflow in converter/ppm/xpmtoppm.c in netpbm before 10.47.07 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an XPM image file that contains a crafted header field associated with a large color index value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bc09a0964faa3fc0315644db37f8e28c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058595" comment="libnetpbm-32bit less than 1.0.0-657.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058596" comment="libnetpbm less than 1.0.0-657.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058597" comment="netpbm less than 10.26.22-14.10.1"/>
		</criteria>
	</criteria>
	<!-- c55990c28f5d933b319140fb62a2fc33 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058595" comment="libnetpbm-32bit less than 1.0.0-657.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058598" comment="libnetpbm-64bit less than 1.0.0-657.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058599" comment="libnetpbm-x86 less than 1.0.0-657.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058596" comment="libnetpbm less than 1.0.0-657.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058597" comment="netpbm less than 10.26.22-14.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058595" comment="libnetpbm-32bit less than 1.0.0-657.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058596" comment="libnetpbm less than 1.0.0-657.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058597" comment="netpbm less than 10.26.22-14.10.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4355</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2009-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4355" source="CVE"/>
	<description>
	Memory leak in the zlib_stateful_finish function in crypto/comp/c_zlib.c in OpenSSL 0.9.8l and earlier and 1.0.0 Beta through Beta 4 allows remote attackers to cause a denial of service (memory consumption) via vectors that trigger incorrect calls to the CRYPTO_cleanup_all_ex_data function, as demonstrated by use of SSLv3 and PHP with the Apache HTTP Server, a related issue to CVE-2008-1678.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 206279037214e4a68954e12f6a5d8ab1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059511" comment="openssl-32bit less than 0.9.8a-18.39.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059512" comment="openssl-devel-32bit less than 0.9.8a-18.39.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059513" comment="openssl-devel less than 0.9.8a-18.39.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059517" comment="openssl-doc less than 0.9.8a-18.39.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059514" comment="openssl less than 0.9.8a-18.39.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059517" comment="openssl-doc less than 0.9.8a-18.39.3"/>
		</criteria></criteria>
	<!-- 373d1722f8baa6f0246e1f1564e17b32 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057482" comment="openssl-32bit less than 0.9.8a-18.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057486" comment="openssl-64bit less than 0.9.8a-18.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057483" comment="openssl-devel-32bit less than 0.9.8a-18.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057487" comment="openssl-devel-64bit less than 0.9.8a-18.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057484" comment="openssl-devel less than 0.9.8a-18.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057488" comment="openssl-doc less than 0.9.8a-18.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057489" comment="openssl-x86 less than 0.9.8a-18.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057485" comment="openssl less than 0.9.8a-18.40.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057488" comment="openssl-doc less than 0.9.8a-18.40.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4376</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4376" source="CVE"/>
	<description>
	Buffer overflow in the daintree_sna_read function in the Daintree SNA file parser in Wireshark 1.2.0 through 1.2.4 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a7013413afe9902cca86ec3f1281b76e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058913" comment="ethereal less than 0.10.14-16.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
		</criteria></criteria>
	<!-- d3489af786e9a9c50fe6fe2a5f000813 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058915" comment="ethereal less than 0.10.14-16.40.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4377</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4377" source="CVE"/>
	<description>
	The (1) SMB and (2) SMB2 dissectors in Wireshark 0.9.0 through 1.2.4 allow remote attackers to cause a denial of service (crash) via a crafted packet that triggers a NULL pointer dereference, as demonstrated by fuzz-2009-12-07-11141.pcap.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a7013413afe9902cca86ec3f1281b76e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058913" comment="ethereal less than 0.10.14-16.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
		</criteria></criteria>
	<!-- d3489af786e9a9c50fe6fe2a5f000813 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058915" comment="ethereal less than 0.10.14-16.40.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4484</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4484" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the CertDecoder::GetName function in src/asn.cpp in TaoCrypt in yaSSL before 1.9.9, as used in mysqld in MySQL 5.0.x before 5.0.90, MySQL 5.1.x before 5.1.43, MySQL 5.5.x through 5.5.0-m2, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption and daemon crash) by establishing an SSL connection and sending an X.509 client certificate with a crafted name field, as demonstrated by mysql_overflow1.py and the vd_mysql5 module in VulnDisco Pack Professional 8.11. NOTE: this was originally reported for MySQL 5.0.51a.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 71d78dc72e348aa31062cbc12a65c867 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058924" comment="mysql-Max less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058927" comment="mysql-bench less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058919" comment="mysql-client less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058920" comment="mysql-devel less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058921" comment="mysql-shared-32bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058925" comment="mysql-shared-64bit less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058926" comment="mysql-shared-x86 less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058922" comment="mysql-shared less than 5.0.26-12.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058923" comment="mysql less than 5.0.26-12.28.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f637910c82f5652219cfb8cf0ba4069f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058933" comment="mysql-Max less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058936" comment="mysql-bench less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058928" comment="mysql-client less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058929" comment="mysql-devel less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058930" comment="mysql-shared-32bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058934" comment="mysql-shared-64bit less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058935" comment="mysql-shared-x86 less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058931" comment="mysql-shared less than 5.0.26-12.24.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058932" comment="mysql less than 5.0.26-12.24.5"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4536</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4536" source="CVE"/>
	<description>
	drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 0e38893ae48531c465e75bb476887271 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057699" comment="kernel-xenpae less than 2.6.16.60-0.42.9"/>
		</criteria>
	</criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 28c8f48c0fee5a87c37ae066bdfccd05 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057413" comment="kernel-bigsmp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057422" comment="kernel-kdumppae less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057415" comment="kernel-smp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057423" comment="kernel-vmi less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057424" comment="kernel-vmipae less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057419" comment="kernel-xenpae less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057419" comment="kernel-xenpae less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 30f07ef6de0dd95483ac654f9d961abb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059519" comment="kernel-iseries64 less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059520" comment="kernel-ppc64 less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
		</criteria></criteria>
	<!-- 57a3a4a9839eab360dee86a579b868c1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
		</criteria></criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 7a90bbd78c61a210fcbf21c821ac1ec8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057694" comment="kernel-default less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057695" comment="kernel-smp less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057696" comment="kernel-source less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057697" comment="kernel-syms less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			</criteria>
		</criteria></criteria>
	<!-- 7ab8659e9762f6aa1d31509f781cf439 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057415" comment="kernel-smp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8b2b60b887db75c09a6f2674ec8bea6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
		</criteria>
	</criteria>
	<!-- 8e541b7f2bfe8694ff60329a4b87780b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
	</criteria>
	<!-- a02e6340cd8b95ceba636634ae907750 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
	</criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4537</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4537" source="CVE"/>
	<description>
	drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via a packet with a crafted size, in conjunction with certain packets containing A characters and certain packets containing E characters; or (2) cause a denial of service (system crash) via a packet with a crafted size, in conjunction with certain packets containing '\0' characters, related to the value of the status register and erroneous behavior associated with the RxMaxSize register.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1389.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 132a57d5a85c59b02655912de8a478f9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059934" comment="kernel-debug less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059929" comment="kernel-default less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059935" comment="kernel-kdump less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059930" comment="kernel-smp less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059931" comment="kernel-source less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059932" comment="kernel-syms less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059933" comment="kernel-xen less than 2.6.16.60-0.62.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059934" comment="kernel-debug less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059935" comment="kernel-kdump less than 2.6.16.60-0.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059933" comment="kernel-xen less than 2.6.16.60-0.62.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 1c957a85a69c88dcb46bbd0a62699cc4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
		</criteria>
	</criteria>
	<!-- 37bb490b2d9ca27c1027e09c0453381c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060291" comment="kernel-default less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060294" comment="kernel-smp less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060292" comment="kernel-source less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060293" comment="kernel-syms less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e02dcbe650533bbc5c4aeb6300f0d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060299" comment="kernel-xenpae less than 2.6.16.60-0.42.10"/>
		</criteria>
	</criteria>
	<!-- 58606a54b98cffc92a05e22b837abf49 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060835" comment="kernel-iseries64 less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060837" comment="kernel-ppc64 less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
		</criteria></criteria>
	<!-- 75b1fc9033bce92e8f6775150c0af485 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
		</criteria></criteria>
	<!-- b1a5693e9b87368b2dc89b804303d9b2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060841" comment="kernel-smp less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria></criteria>
	<!-- cf13ba7162e8d3407e2e9d889c8521f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060843" comment="kernel-bigsmp less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060834" comment="kernel-default less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060845" comment="kernel-kdumppae less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060841" comment="kernel-smp less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060838" comment="kernel-source less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060839" comment="kernel-syms less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060846" comment="kernel-vmi less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060847" comment="kernel-vmipae less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060844" comment="kernel-xenpae less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060840" comment="kernel-debug less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060836" comment="kernel-kdump less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060842" comment="kernel-xen less than 2.6.16.60-0.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060844" comment="kernel-xenpae less than 2.6.16.60-0.66.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e7da2abdeaf19e694fa26d810aaab118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ef2b9d5d6bc17682fa94fd4898564773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4538</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4538" source="CVE"/>
	<description>
	drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e38893ae48531c465e75bb476887271 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057699" comment="kernel-xenpae less than 2.6.16.60-0.42.9"/>
		</criteria>
	</criteria>
	<!-- 28c8f48c0fee5a87c37ae066bdfccd05 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057413" comment="kernel-bigsmp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057422" comment="kernel-kdumppae less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057415" comment="kernel-smp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057423" comment="kernel-vmi less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057424" comment="kernel-vmipae less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057419" comment="kernel-xenpae less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057419" comment="kernel-xenpae less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30f07ef6de0dd95483ac654f9d961abb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059519" comment="kernel-iseries64 less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059520" comment="kernel-ppc64 less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
		</criteria></criteria>
	<!-- 57a3a4a9839eab360dee86a579b868c1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
		</criteria></criteria>
	<!-- 7a90bbd78c61a210fcbf21c821ac1ec8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057694" comment="kernel-default less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057695" comment="kernel-smp less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057696" comment="kernel-source less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057697" comment="kernel-syms less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057698" comment="kernel-xen less than 2.6.16.60-0.42.9"/>
			</criteria>
		</criteria></criteria>
	<!-- 7ab8659e9762f6aa1d31509f781cf439 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057415" comment="kernel-smp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8b2b60b887db75c09a6f2674ec8bea6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
		</criteria>
	</criteria>
	<!-- 8e541b7f2bfe8694ff60329a4b87780b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057700" comment="kernel-debug less than 2.6.16.60-0.42.9"/>
	</criteria>
	<!-- a02e6340cd8b95ceba636634ae907750 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057701" comment="kernel-kdump less than 2.6.16.60-0.42.9"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4565</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2009-4565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4565" source="CVE"/>
	<description>
	sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 637f7c015ec852910c5ed66bc8101858 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058484" comment="sendmail-devel less than 8.13.6-9.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058483" comment="sendmail less than 8.13.6-9.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058485" comment="uucp less than 1.07-268.18.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058484" comment="sendmail-devel less than 8.13.6-9.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058485" comment="uucp less than 1.07-268.18.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b86cdbfafd72757c91f2d159b21104db -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058484" comment="sendmail-devel less than 8.13.6-9.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058483" comment="sendmail less than 8.13.6-9.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058486" comment="uucp less than 1.07-268.16.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058484" comment="sendmail-devel less than 8.13.6-9.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058486" comment="uucp less than 1.07-268.16.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20094835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-4835</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-4835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4835" source="CVE"/>
	<description>
	The (1) htk_read_header, (2) alaw_init, (3) ulaw_init, (4) pcm_init, (5) float32_init, and (6) sds_read_header functions in libsndfile 1.0.20 allow context-dependent attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted audio file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353cec4df70fe9d46be9127fe99a5ebf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069638" comment="libsndfile-32bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069641" comment="libsndfile-64bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069642" comment="libsndfile-x86 less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069640" comment="libsndfile less than 1.0.12-13.13.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
		</criteria></criteria>
	<!-- 58c640f70169a604644449c65c73c2ad -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069638" comment="libsndfile-32bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069641" comment="libsndfile-64bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069642" comment="libsndfile-x86 less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069640" comment="libsndfile less than 1.0.12-13.13.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069638" comment="libsndfile-32bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069640" comment="libsndfile less than 1.0.12-13.13.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5028</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2009-5028" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5028" source="CVE"/>
	<description>
	Stack-based buffer overflow in Namazu before 2.0.20 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted request containing an empty uri field.
	</description>
 </metadata>
<!-- 54ebd621e72f41f2f28b51ed5373ea16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072262" comment="namazu less than 2.0.18-24.6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5029</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-5029" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5029" source="CVE"/>
	<description>
	Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17c15337eaf4f28f28cdc9f9d3d731ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104319" comment="glibc-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104320" comment="glibc-devel-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104321" comment="glibc-devel less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104322" comment="glibc-html less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104323" comment="glibc-i18ndata less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104324" comment="glibc-info less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104325" comment="glibc-locale-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104326" comment="glibc-locale less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104327" comment="glibc-profile-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104328" comment="glibc-profile less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104329" comment="glibc less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104330" comment="nscd less than 2.4-31.77.102.1"/>
		</criteria>
	</criteria>
	<!-- aba5a35b05cac6339a45d9264306d85b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072376" comment="glibc-32bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072386" comment="glibc-64bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072377" comment="glibc-devel-32bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072387" comment="glibc-devel-64bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072378" comment="glibc-devel less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072379" comment="glibc-html less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072380" comment="glibc-i18ndata less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072381" comment="glibc-info less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072382" comment="glibc-locale-32bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072388" comment="glibc-locale-64bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072389" comment="glibc-locale-x86 less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072383" comment="glibc-locale less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072390" comment="glibc-profile-32bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072391" comment="glibc-profile-64bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072392" comment="glibc-profile-x86 less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072393" comment="glibc-profile less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072394" comment="glibc-x86 less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072384" comment="glibc less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072385" comment="nscd less than 2.4-31.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072395" comment="glibc-dceext-32bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072396" comment="glibc-dceext-64bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072397" comment="glibc-dceext-x86 less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072398" comment="glibc-dceext less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072379" comment="glibc-html less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072390" comment="glibc-profile-32bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072391" comment="glibc-profile-64bit less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072392" comment="glibc-profile-x86 less than 2.4-31.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072393" comment="glibc-profile less than 2.4-31.97.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5063</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-5063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5063" source="CVE"/>
	<description>
	Memory leak in the embedded_profile_len function in pngwutil.c in libpng before 1.2.39beta5 allows context-dependent attackers to cause a denial of service (memory leak or segmentation fault) via a JPEG image containing an iCCP chunk with a negative embedded profile length.  NOTE: this is due to an incomplete fix for CVE-2006-7244.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 609aeaffe7658a6e23df39f586c9edb6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria></criteria>
	<!-- cfe75a17284d23a11571eeefdcbad4a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20095138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2009-5138</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2009-5138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5138" source="CVE"/>
	<description>
	GnuTLS before 2.7.6, when the GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT flag is not enabled, treats version 1 X.509 certificates as intermediate CAs, which allows remote attackers to bypass intended restrictions by leveraging a X.509 V1 certificate from a trusted CA to issue new certificates, a different vulnerability than CVE-2014-1959.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37d0e9642492b343b6f431f0fecb7b5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0001</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2010-0001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0001" source="CVE"/>
	<description>
	Integer underflow in the unlzw function in unlzw.c in gzip before 1.4 on 64-bit platforms, as used in ncompress and probably others, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted archive that uses LZW compression, leading to an array index error.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37827d5d85a565d898b03c827aa4bb0d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057497" comment="gzip less than 1.3.5-159.10.1"/>
	</criteria>
	<!-- 5e020c0fdf9bfed4daa27c5a6bdb4f2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057497" comment="gzip less than 1.3.5-159.10.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0007</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0007" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0007" source="CVE"/>
	<description>
	net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28c8f48c0fee5a87c37ae066bdfccd05 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057413" comment="kernel-bigsmp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057422" comment="kernel-kdumppae less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057415" comment="kernel-smp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057423" comment="kernel-vmi less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057424" comment="kernel-vmipae less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057419" comment="kernel-xenpae less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057419" comment="kernel-xenpae less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 30f07ef6de0dd95483ac654f9d961abb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059519" comment="kernel-iseries64 less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059520" comment="kernel-ppc64 less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
		</criteria></criteria>
	<!-- 57a3a4a9839eab360dee86a579b868c1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
		</criteria></criteria>
	<!-- 7ab8659e9762f6aa1d31509f781cf439 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057415" comment="kernel-smp less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057420" comment="kernel-debug less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057421" comment="kernel-kdump less than 2.6.16.60-0.59.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057418" comment="kernel-xen less than 2.6.16.60-0.59.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8b2b60b887db75c09a6f2674ec8bea6e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057414" comment="kernel-default less than 2.6.16.60-0.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057416" comment="kernel-source less than 2.6.16.60-0.59.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057417" comment="kernel-syms less than 2.6.16.60-0.59.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0008</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-0008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0008" source="CVE"/>
	<description>
	The sctp_rcv_ootb function in the SCTP implementation in the Linux kernel before 2.6.23 allows remote attackers to cause a denial of service (infinite loop) via (1) an Out Of The Blue (OOTB) chunk or (2) a chunk of zero length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0013</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0013" source="CVE"/>
	<description>
	Directory traversal vulnerability in slp.c in the MSN protocol plugin in libpurple in Pidgin 2.6.4 and Adium 1.3.8 allows remote attackers to read arbitrary files via a .. (dot dot) in an application/x-msnmsgrp2p MSN emoticon (aka custom smiley) request, a related issue to CVE-2004-0122.  NOTE: it could be argued that this is resultant from a vulnerability in which an emoticon download request is processed even without a preceding text/x-mms-emoticon message that announced availability of the emoticon.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 50f32d80d39a4dd5b12549f50b2c99b4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
	<!-- f145961cae2a2f30d6220782b99976e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0015</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0015" source="CVE"/>
	<description>
	nis/nss_nis/nis-pwd.c in the GNU C Library (aka glibc or libc6) 2.7 and Embedded GLIBC (EGLIBC) 2.10.2 adds information from the passwd.adjunct.byname map to entries in the passwd map, which allows remote attackers to obtain the encrypted passwords of NIS accounts by calling the getpwnam function.
	</description>
 </metadata>
<!-- a7e1bffd1e2cae6bb5c9bbff3d3f9de2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070518" comment="glibc-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070519" comment="glibc-devel-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070520" comment="glibc-locale-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070521" comment="glibc-locale-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070526" comment="glibc-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070527" comment="glibc-dceext-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070528" comment="glibc-dceext-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070529" comment="glibc-dceext-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070530" comment="glibc-dceext less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0084</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0084" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2010-0091.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0085</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0085" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0088.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0087</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0087" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0088</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0088" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0085.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0089</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0089" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start, Java Plug-in component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0091</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0091" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality via unknown vectors, a different vulnerability than CVE-2010-0084.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0092</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0092" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0094</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0094" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18 and 5.0 Update 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is due to missing privilege checks during deserialization of RMIConnectionImpl objects, which allows remote attackers to call system-level Java functions via the ClassLoader of a constructor that is being deserialized.
	</description>
 </metadata>
<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0095</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0095" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-0093.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0098</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0098" source="CVE"/>
	<description>
	ClamAV before 0.96 does not properly handle the (1) CAB and (2) 7z file formats, which allows remote attackers to bypass virus detection via a crafted archive that is compatible with standard archive utilities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe0a47e2d9e4a6160a308a56172d457 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059973" comment="clamav less than 0.96-0.6.1"/>
	</criteria>
	<!-- dc27506bfedbec1089a0ef7029bb8f5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059845" comment="clamav less than 0.96-0.4.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0136</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0136" source="CVE"/>
	<description>
	OpenOffice.org (OOo) 2.0.4, 2.4.1, and 3.1.1 does not properly enforce Visual Basic for Applications (VBA) macro security settings, which allows remote attackers to run arbitrary macros via a crafted document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17aa6adc1c5e58a79af02c479d95aab1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058675" comment="OpenOffice_org-cs less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058677" comment="OpenOffice_org-de less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058678" comment="OpenOffice_org-es less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058680" comment="OpenOffice_org-fr less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058681" comment="OpenOffice_org-galleries less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058682" comment="OpenOffice_org-gnome less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058685" comment="OpenOffice_org-hu less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058686" comment="OpenOffice_org-it less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058687" comment="OpenOffice_org-ja less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058688" comment="OpenOffice_org-kde less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058689" comment="OpenOffice_org-mono less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058694" comment="OpenOffice_org-pl less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058695" comment="OpenOffice_org-pt-BR less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058697" comment="OpenOffice_org-sk less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058700" comment="OpenOffice_org-zh-CN less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058701" comment="OpenOffice_org-zh-TW less than 3.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058703" comment="OpenOffice_org less than 3.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8cf721e6c038d1eb986a470c51370399 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058707" comment="OpenOffice_org-cs less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058709" comment="OpenOffice_org-de less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058712" comment="OpenOffice_org-es less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058714" comment="OpenOffice_org-fr less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058715" comment="OpenOffice_org-galleries less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058716" comment="OpenOffice_org-gnome less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058719" comment="OpenOffice_org-hu less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058720" comment="OpenOffice_org-it less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058721" comment="OpenOffice_org-ja less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058722" comment="OpenOffice_org-kde less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058724" comment="OpenOffice_org-mono less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058729" comment="OpenOffice_org-pl less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058730" comment="OpenOffice_org-pt-BR less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058732" comment="OpenOffice_org-sk less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058735" comment="OpenOffice_org-zh-CN less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058736" comment="OpenOffice_org-zh-TW less than 3.2-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058738" comment="OpenOffice_org less than 3.2-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0159</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0159" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, Thunderbird before 3.0.2, and SeaMonkey before 2.0.3 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsBlockFrame::StealFrame function in layout/generic/nsBlockFrame.cpp, and unspecified other vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2755cbbc26038704cb28fe5609654649 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 630708f048967bcbe3d7e12e91204fcf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 92493341108c831de901f98149d82c69 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058440" comment="MozillaFirefox-translations less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058441" comment="MozillaFirefox less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058448" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d41075930b3e4dc43019336480f6a248 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058453" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0160</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0160" source="CVE"/>
	<description>
	The Web Worker functionality in Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly handle array data types for posted messages, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2755cbbc26038704cb28fe5609654649 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 630708f048967bcbe3d7e12e91204fcf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 92493341108c831de901f98149d82c69 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058440" comment="MozillaFirefox-translations less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058441" comment="MozillaFirefox less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058448" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d41075930b3e4dc43019336480f6a248 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058453" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0162" source="CVE"/>
	<description>
	Mozilla Firefox 3.0.x before 3.0.18 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, does not properly support the application/octet-stream content type as a protection mechanism against execution of web script in certain circumstances involving SVG and the EMBED element, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via an embedded SVG document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2755cbbc26038704cb28fe5609654649 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 630708f048967bcbe3d7e12e91204fcf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058405" comment="mozilla-xulrunner190-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058406" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058407" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058408" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058409" comment="mozilla-xulrunner190-translations less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058410" comment="mozilla-xulrunner190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058411" comment="mozilla-xulrunner190-devel less than 1.9.0.18-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058412" comment="python-xpcom190 less than 1.9.0.18-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 92493341108c831de901f98149d82c69 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058440" comment="MozillaFirefox-translations less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058441" comment="MozillaFirefox less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058448" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d41075930b3e4dc43019336480f6a248 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058451" comment="MozillaFirefox-translations less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058452" comment="MozillaFirefox less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058442" comment="mozilla-xulrunner191-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058443" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058444" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058445" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058446" comment="mozilla-xulrunner191-translations less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058447" comment="mozilla-xulrunner191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058453" comment="MozillaFirefox-branding-upstream less than 3.5.8-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058449" comment="mozilla-xulrunner191-devel less than 1.9.1.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058450" comment="python-xpcom191 less than 1.9.1.8-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0173</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0173" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0174" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0175" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection implementation in Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.9, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors that trigger a call to the handler for the select event for XUL tree items.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0176" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2; Thunderbird before 3.0.4; and SeaMonkey before 2.0.4 do not properly manage reference counts for option elements in a XUL tree optgroup, which might allow remote attackers to execute arbitrary code via unspecified vectors that trigger access to deleted elements, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0177" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, frees the contents of the window.navigator.plugins array while a reference to an array element is still active, which allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0178</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19, 3.5.x before 3.5.9, and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, does not prevent applets from interpreting mouse clicks as drag-and-drop actions, which allows remote attackers to execute arbitrary JavaScript with Chrome privileges by loading a chrome: URL and then loading a javascript: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0179" source="CVE"/>
	<description>
	Mozilla Firefox before 3.0.19 and 3.5.x before 3.5.8, and SeaMonkey before 2.0.3, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 61e0860309635831b6c4f3a30dccd608 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0181" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, and SeaMonkey before 2.0.4, executes a mail application in situations where an IMG element has a SRC attribute that is a redirect to a mailto: URL, which allows remote attackers to cause a denial of service (excessive application launches) via an HTML document with many images.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0182" source="CVE"/>
	<description>
	The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 65e1119797680c75f5f7043e72c6987b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b9360b6f8cbf86508b974bdda6379f4d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059562" comment="mozilla-xulrunner190-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059563" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059564" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059565" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059566" comment="mozilla-xulrunner190-translations less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059567" comment="mozilla-xulrunner190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059568" comment="mozilla-xulrunner190-devel less than 1.9.0.19-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059569" comment="python-xpcom190 less than 1.9.0.19-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c053554d7ebb124457bc5983a3bd1377 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e49a879fd8c536f312451cd93ac147a5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059570" comment="MozillaFirefox-translations less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059571" comment="MozillaFirefox less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059572" comment="mozilla-xulrunner191-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059573" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059574" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059575" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059576" comment="mozilla-xulrunner191-translations less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059577" comment="mozilla-xulrunner191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059578" comment="MozillaFirefox-branding-upstream less than 3.5.9-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059579" comment="mozilla-xulrunner191-devel less than 1.9.1.9-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059580" comment="python-xpcom191 less than 1.9.1.9-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0183" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsCycleCollector::MarkRoots function in Mozilla Firefox 3.5.x before 3.5.10 and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a crafted HTML document, related to an improper frame construction process for menus.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0205" source="CVE"/>
	<description>
	The png_decompress_chunk function in pngrutil.c in libpng 1.0.x before 1.0.53, 1.2.x before 1.2.43, and 1.4.x before 1.4.1 does not properly handle compressed ancillary-chunk data that has a disproportionately large uncompressed representation, which allows remote attackers to cause a denial of service (memory and CPU consumption, and application hang) via a crafted PNG file, as demonstrated by use of the deflate compression method on data composed of many occurrences of the same character, related to a "decompression bomb" attack.
	</description>
 </metadata>
<!-- 6c342648d084c0a27cf90b4e478dd419 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060304" comment="libpng-32bit less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060308" comment="libpng-64bit less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060305" comment="libpng-devel-32bit less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060309" comment="libpng-devel-64bit less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060306" comment="libpng-devel less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060310" comment="libpng-x86 less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060307" comment="libpng less than 1.2.8-19.28.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060304" comment="libpng-32bit less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060305" comment="libpng-devel-32bit less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060306" comment="libpng-devel less than 1.2.8-19.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060307" comment="libpng less than 1.2.8-19.28.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0211</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0211" source="CVE"/>
	<description>
	The slap_modrdn2mods function in modrdn.c in OpenLDAP 2.4.22 does not check the return value of a call to the smr_normalize function, which allows remote attackers to cause a denial of service (segmentation fault) and possibly execute arbitrary code via a modrdn call with an RDN string containing invalid UTF-8 sequences, which triggers a free of an invalid, uninitialized pointer in the slap_mods_free function, as demonstrated using the Codenomicon LDAPv3 test suite.
	</description>
 </metadata>
<!-- e9480928ac9cfc137826355cdaa57ecf -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062058" comment="openldap2-back-meta less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062059" comment="openldap2-back-perl less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062053" comment="openldap2-client-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062060" comment="openldap2-client-64bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062061" comment="openldap2-client-x86 less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062054" comment="openldap2-client less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062055" comment="openldap2-devel-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062062" comment="openldap2-devel-64bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062056" comment="openldap2-devel less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062057" comment="openldap2 less than 2.3.32-0.37.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062058" comment="openldap2-back-meta less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062059" comment="openldap2-back-perl less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062053" comment="openldap2-client-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062054" comment="openldap2-client less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062055" comment="openldap2-devel-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062056" comment="openldap2-devel less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062057" comment="openldap2 less than 2.3.32-0.37.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062058" comment="openldap2-back-meta less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062059" comment="openldap2-back-perl less than 2.3.32-0.37.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0212</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0212" source="CVE"/>
	<description>
	OpenLDAP 2.4.22 allows remote attackers to cause a denial of service (crash) via a modrdn call with a zero-length RDN destination string, which is not properly handled by the smr_normalize function and triggers a NULL pointer dereference in the IA5StringNormalize function in schema_init.c, as demonstrated using the Codenomicon LDAPv3 test suite.
	</description>
 </metadata>
<!-- e9480928ac9cfc137826355cdaa57ecf -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062058" comment="openldap2-back-meta less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062059" comment="openldap2-back-perl less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062053" comment="openldap2-client-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062060" comment="openldap2-client-64bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062061" comment="openldap2-client-x86 less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062054" comment="openldap2-client less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062055" comment="openldap2-devel-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062062" comment="openldap2-devel-64bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062056" comment="openldap2-devel less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062057" comment="openldap2 less than 2.3.32-0.37.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062058" comment="openldap2-back-meta less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062059" comment="openldap2-back-perl less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062053" comment="openldap2-client-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062054" comment="openldap2-client less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062055" comment="openldap2-devel-32bit less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062056" comment="openldap2-devel less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062057" comment="openldap2 less than 2.3.32-0.37.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062058" comment="openldap2-back-meta less than 2.3.32-0.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062059" comment="openldap2-back-perl less than 2.3.32-0.37.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0220</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
	</affected>
	<reference ref_id="CVE-2010-0220" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0220" source="CVE"/>
	<description>
	The nsObserverList::FillObserverArray function in xpcom/ds/nsObserverList.cpp in Mozilla Firefox before 3.5.7 allows remote attackers to cause a denial of service (application crash) via a crafted web site that triggers memory consumption and an accompanying Low Memory alert dialog, and also triggers attempted removal of an observer from an empty observers array.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2568eceb5f6176299a81e01527909250 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057647" comment="mozilla-xulrunner190-32bit less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057648" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057649" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057650" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057651" comment="mozilla-xulrunner190-translations less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057652" comment="mozilla-xulrunner190 less than 1.9.0.17-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057653" comment="mozilla-xulrunner190-devel less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057654" comment="python-xpcom190 less than 1.9.0.17-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- af3b019b054c2108bc5e0192f1063c73 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057660" comment="MozillaFirefox-translations less than 3.5.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057661" comment="MozillaFirefox less than 3.5.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057662" comment="mozilla-xulrunner191-32bit less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057663" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057664" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057665" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057666" comment="mozilla-xulrunner191-translations less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057667" comment="mozilla-xulrunner191 less than 1.9.1.7-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057668" comment="MozillaFirefox-branding-upstream less than 3.5.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057669" comment="mozilla-xulrunner191-devel less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057670" comment="python-xpcom191 less than 1.9.1.7-1.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e0375f6a4697591175520d61a8dd7b70 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057647" comment="mozilla-xulrunner190-32bit less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057648" comment="mozilla-xulrunner190-gnomevfs-32bit less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057649" comment="mozilla-xulrunner190-gnomevfs less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057650" comment="mozilla-xulrunner190-translations-32bit less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057651" comment="mozilla-xulrunner190-translations less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057652" comment="mozilla-xulrunner190 less than 1.9.0.17-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057653" comment="mozilla-xulrunner190-devel less than 1.9.0.17-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057654" comment="python-xpcom190 less than 1.9.0.17-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f9103589486f0a989bea800ed2b2ea23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057660" comment="MozillaFirefox-translations less than 3.5.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057661" comment="MozillaFirefox less than 3.5.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057662" comment="mozilla-xulrunner191-32bit less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057663" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057664" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057665" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057666" comment="mozilla-xulrunner191-translations less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057667" comment="mozilla-xulrunner191 less than 1.9.1.7-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009057668" comment="MozillaFirefox-branding-upstream less than 3.5.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057669" comment="mozilla-xulrunner191-devel less than 1.9.1.7-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009057670" comment="python-xpcom191 less than 1.9.1.7-1.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0230</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0230" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0230" source="CVE"/>
	<description>
	SUSE Linux Enterprise 10 SP3 (SLE10-SP3) and openSUSE 11.2 configures postfix to listen on all network interfaces, which might allow remote attackers to bypass intended access restrictions.
	</description>
 </metadata>
<!-- e9ed7474141480a4d84752bb6a9c8342 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057254" comment="postfix less than 2.5.6-4.8.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0277</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0277" source="CVE"/>
	<description>
	slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.6.6, including 2.6.4, and Adium 1.3.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed MSNSLP INVITE request in an SLP message, a different issue than CVE-2010-0013.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 50f32d80d39a4dd5b12549f50b2c99b4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
	<!-- f145961cae2a2f30d6220782b99976e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0295</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0295" source="CVE"/>
	<description>
	lighttpd before 1.4.26, and 1.5.x, allocates a buffer for each read operation that occurs for a request, which allows remote attackers to cause a denial of service (memory consumption) by breaking a request into small pieces that are sent at a slow rate.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 870db065b06f064a6afd14163d028d98 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057766" comment="lighttpd-mod_cml less than 1.4.10-11.28.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057767" comment="lighttpd-mod_mysql_vhost less than 1.4.10-11.28.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057768" comment="lighttpd-mod_rrdtool less than 1.4.10-11.28.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057769" comment="lighttpd-mod_trigger_b4_dl less than 1.4.10-11.28.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057770" comment="lighttpd-mod_webdav less than 1.4.10-11.28.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057771" comment="lighttpd less than 1.4.10-11.28.2"/>
		</criteria>
	</criteria>
	<!-- c32343d3128c38d88e431b07c5f2f22c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057772" comment="lighttpd-mod_cml less than 1.4.10-11.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057773" comment="lighttpd-mod_mysql_vhost less than 1.4.10-11.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057774" comment="lighttpd-mod_rrdtool less than 1.4.10-11.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057775" comment="lighttpd-mod_trigger_b4_dl less than 1.4.10-11.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057776" comment="lighttpd-mod_webdav less than 1.4.10-11.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057777" comment="lighttpd less than 1.4.10-11.30.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0296</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0296" source="CVE"/>
	<description>
	The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
	</description>
 </metadata>
<!-- a7e1bffd1e2cae6bb5c9bbff3d3f9de2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070518" comment="glibc-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070519" comment="glibc-devel-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070520" comment="glibc-locale-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070521" comment="glibc-locale-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070526" comment="glibc-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070527" comment="glibc-dceext-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070528" comment="glibc-dceext-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070529" comment="glibc-dceext-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070530" comment="glibc-dceext less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0304</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0304" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0304" source="CVE"/>
	<description>
	Multiple buffer overflows in the LWRES dissector in Wireshark 0.9.15 through 1.0.10 and 1.2.0 through 1.2.5 allow remote attackers to cause a denial of service (crash) via a malformed packet, as demonstrated using a stack-based buffer overflow to the dissect_getaddrsbyname_request function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a7013413afe9902cca86ec3f1281b76e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058913" comment="ethereal less than 0.10.14-16.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058914" comment="ethereal-devel less than 0.10.14-16.41.1"/>
		</criteria></criteria>
	<!-- d3489af786e9a9c50fe6fe2a5f000813 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058915" comment="ethereal less than 0.10.14-16.40.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009058916" comment="ethereal-devel less than 0.10.14-16.40.3"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0308</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0308" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0308" source="CVE"/>
	<description>
	lib/rfc1035.c in Squid 2.x, 3.0 through 3.0.STABLE22, and 3.1 through 3.1.0.15 allows remote attackers to cause a denial of service (assertion failure) via a crafted DNS packet that only contains a header.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 886a2dff279c348e7a16ac2a73a99bb7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059072" comment="squid less than 2.5.STABLE12-18.13.982.2.2"/>
	</criteria>
	<!-- c47f23990313deda7c25045777a1d09b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059073" comment="squid less than 2.5.STABLE12-18.13.982.2.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0395</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0395" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0395" source="CVE"/>
	<description>
	OpenOffice.org 2.x and 3.0 before 3.2.1 allows user-assisted remote attackers to bypass Python macro security restrictions and execute arbitrary Python code via a crafted OpenDocument Text (ODT) file that triggers code execution when the macro directory structure is previewed.
	</description>
 </metadata>
<!-- 5789ee106e960c8b674f218923b99512 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009061722" comment="OpenOffice_org-cs less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061724" comment="OpenOffice_org-de less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061727" comment="OpenOffice_org-es less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061729" comment="OpenOffice_org-fr less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061730" comment="OpenOffice_org-galleries less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061731" comment="OpenOffice_org-gnome less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061734" comment="OpenOffice_org-hu less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061735" comment="OpenOffice_org-it less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061736" comment="OpenOffice_org-ja less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061737" comment="OpenOffice_org-kde less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061739" comment="OpenOffice_org-mono less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061744" comment="OpenOffice_org-pl less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061745" comment="OpenOffice_org-pt-BR less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061747" comment="OpenOffice_org-sk less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061750" comment="OpenOffice_org-zh-CN less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061751" comment="OpenOffice_org-zh-TW less than 3.2.1-0.4.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061753" comment="OpenOffice_org less than 3.2.1-0.4.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0397</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0397" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0397" source="CVE"/>
	<description>
	The xmlrpc extension in PHP 5.3.1 does not properly handle a missing methodName element in the first argument to the xmlrpc_decode_request function, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) and possibly have unspecified other impact via a crafted argument.
	</description>
 </metadata>
<!-- a465fef49cd0917e6c11e39749442442 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062613" comment="php5-tidy less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0405</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0405" source="CVE"/>
	<description>
	Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
	</description>
 </metadata>
<!-- 592a9b28d8bb5f34d0edf0c2399959df -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063225" comment="bzip2-32bit less than 1.0.3-17.15.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063227" comment="bzip2-64bit less than 1.0.3-17.15.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063228" comment="bzip2-x86 less than 1.0.3-17.15.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063226" comment="bzip2 less than 1.0.3-17.15.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063225" comment="bzip2-32bit less than 1.0.3-17.15.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063226" comment="bzip2 less than 1.0.3-17.15.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0407</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0407" source="CVE"/>
	<description>
	Multiple buffer overflows in the MSGFunctionDemarshall function in winscard_svc.c in the PC/SC Smart Card daemon (aka PCSCD) in MUSCLE PCSC-Lite before 1.5.4 allow local users to gain privileges via crafted message data, which is improperly demarshalled.
	</description>
 </metadata>
<!-- f9f0b4850f079469498b87c6323992e9 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062688" comment="pcsc-lite-devel less than 1.2.9_beta9-17.17.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062689" comment="pcsc-lite less than 1.2.9_beta9-17.17.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0408</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0408" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0408" source="CVE"/>
	<description>
	The ap_proxy_ajp_request function in mod_proxy_ajp.c in mod_proxy_ajp in the Apache HTTP Server 2.2.x before 2.2.15 does not properly handle certain situations in which a client sends no request body, which allows remote attackers to cause a denial of service (backend server outage) via a crafted request, related to use of a 500 error code instead of the appropriate 400 error code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09fcc84c2d143017ab767f974135434 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059937" comment="apache2-devel less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059938" comment="apache2-doc less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059939" comment="apache2-example-pages less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059940" comment="apache2-prefork less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059941" comment="apache2-worker less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059942" comment="apache2 less than 2.2.3-16.29.2"/>
		</criteria>
	</criteria>
	<!-- cf8587229afed37c923abc57f89f7027 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059943" comment="apache2-devel less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059944" comment="apache2-doc less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059945" comment="apache2-example-pages less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059946" comment="apache2-prefork less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059947" comment="apache2-worker less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059948" comment="apache2 less than 2.2.3-16.25.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0410</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0410" source="CVE"/>
	<description>
	drivers/connector/connector.c in the Linux kernel before 2.6.32.8 allows local users to cause a denial of service (memory consumption and system crash) by sending the kernel many NETLINK_CONNECTOR messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30110847005ad3a7ea7c5d1efd067ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 37bb490b2d9ca27c1027e09c0453381c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060291" comment="kernel-default less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060294" comment="kernel-smp less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060292" comment="kernel-source less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060293" comment="kernel-syms less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e02dcbe650533bbc5c4aeb6300f0d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060299" comment="kernel-xenpae less than 2.6.16.60-0.42.10"/>
		</criteria>
	</criteria>
	<!-- 44be42f54c5e35e6e551e68351bbd0e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059220" comment="kernel-bigsmp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059222" comment="kernel-kdumppae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059223" comment="kernel-vmi less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059224" comment="kernel-vmipae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9a1d7bed362eab0ffb8a1cfcb944439e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059204" comment="kernel-iseries64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059206" comment="kernel-ppc64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
	<!-- d5a23ca2612948125ba212f86484077b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
		</criteria>
	</criteria>
	<!-- e7da2abdeaf19e694fa26d810aaab118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ef2b9d5d6bc17682fa94fd4898564773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ffb169f8e0b809058bff6cb318c6a511 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0420" source="CVE"/>
	<description>
	libpurple in Finch in Pidgin before 2.6.6, when an XMPP multi-user chat (MUC) room is used, does not properly parse nicknames containing &lt;br&gt; sequences, which allows remote attackers to cause a denial of service (application crash) via a crafted nickname.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 50f32d80d39a4dd5b12549f50b2c99b4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
	<!-- f145961cae2a2f30d6220782b99976e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0421</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0421" source="CVE"/>
	<description>
	Array index error in the hb_ot_layout_build_glyph_classes function in pango/opentype/hb-ot-layout.cc in Pango before 1.27.1 allows context-dependent attackers to cause a denial of service (application crash) via a crafted font file, related to building a synthetic Glyph Definition (aka GDEF) table by using this font's charmap and the Unicode property database.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43b51229048c22afcb013ada5032f556 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059696" comment="pango-32bit less than 1.10.2-23.8.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059697" comment="pango-devel less than 1.10.2-23.8.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059698" comment="pango-doc less than 1.10.2-23.8.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059699" comment="pango less than 1.10.2-23.8.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059701" comment="pango-devel-64bit less than 1.10.2-23.8.3"/>
		</criteria></criteria>
	<!-- f8957f06660b9d9c7af340279d684999 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059703" comment="pango-32bit less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059707" comment="pango-64bit less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059708" comment="pango-devel-64bit less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059704" comment="pango-devel less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059705" comment="pango-doc less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059709" comment="pango-x86 less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059706" comment="pango less than 1.10.2-23.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059703" comment="pango-32bit less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059704" comment="pango-devel less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059705" comment="pango-doc less than 1.10.2-23.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059706" comment="pango less than 1.10.2-23.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059708" comment="pango-devel-64bit less than 1.10.2-23.9.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0423</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0423" source="CVE"/>
	<description>
	gtkimhtml.c in Pidgin before 2.6.6 allows remote attackers to cause a denial of service (CPU consumption and application hang) by sending many smileys in a (1) IM or (2) chat.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 50f32d80d39a4dd5b12549f50b2c99b4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
	<!-- f145961cae2a2f30d6220782b99976e1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009058529" comment="finch-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058526" comment="finch less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058530" comment="libpurple-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058527" comment="libpurple less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058531" comment="pidgin-devel less than 2.6.6-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058528" comment="pidgin less than 2.6.6-0.4.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0424</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0424" source="CVE"/>
	<description>
	The edit_cmd function in crontab.c in (1) cronie before 1.4.4 and (2) Vixie cron (vixie-cron) allows local users to change the modification times of arbitrary files, and consequently cause a denial of service, via a symlink attack on a temporary file in the /tmp directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 776c19cc0c3c2eb2ec52fd5e4ccce146 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058937" comment="cron less than 4.1-45.27.2"/>
	</criteria>
	<!-- 9a1b912ae4ee3e6d4c41f65e42685eb1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058938" comment="cron less than 4.1-45.31.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0426</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0426" source="CVE"/>
	<description>
	sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a pseudo-command is enabled, permits a match between the name of the pseudo-command and the name of an executable file in an arbitrary directory, which allows local users to gain privileges via a crafted executable file, as demonstrated by a file named sudoedit in a user's home directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43a541b2019c39b216a6d417205cc0e8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058646" comment="sudo less than 1.6.8p12-18.16.2"/>
	</criteria>
	<!-- 52516363f6f16788787cabc5bc367283 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009058662" comment="sudo less than 1.6.8p12-18.17.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0434</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0434" source="CVE"/>
	<description>
	The ap_read_request function in server/protocol.c in the Apache HTTP Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does not properly handle headers in subrequests in certain circumstances involving a parent request that has a body, which might allow remote attackers to obtain sensitive information via a crafted request that triggers access to memory locations associated with an earlier request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a09fcc84c2d143017ab767f974135434 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059937" comment="apache2-devel less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059938" comment="apache2-doc less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059939" comment="apache2-example-pages less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059940" comment="apache2-prefork less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059941" comment="apache2-worker less than 2.2.3-16.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059942" comment="apache2 less than 2.2.3-16.29.2"/>
		</criteria>
	</criteria>
	<!-- cf8587229afed37c923abc57f89f7027 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059943" comment="apache2-devel less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059944" comment="apache2-doc less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059945" comment="apache2-example-pages less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059946" comment="apache2-prefork less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059947" comment="apache2-worker less than 2.2.3-16.25.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059948" comment="apache2 less than 2.2.3-16.25.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0436</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0436" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0436" source="CVE"/>
	<description>
	Race condition in backend/ctrl.c in KDM in KDE Software Compilation (SC) 2.2.0 through 4.4.2 allows local users to change the permissions of arbitrary files, and consequently gain privileges, by blocking the removal of a certain directory that contains a control socket, related to improper interaction with ksm.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31d78f27e80cda33754af3ce424c5653 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059738" comment="fileshareset less than 2.0-84.74.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059739" comment="kdebase3-32bit less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059741" comment="kdebase3-devel less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059749" comment="kdebase3-extra less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059742" comment="kdebase3-kdm less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059743" comment="kdebase3-ksysguardd less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059750" comment="kdebase3-nsplugin64 less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059744" comment="kdebase3-nsplugin less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059745" comment="kdebase3-samba less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059746" comment="kdebase3-session less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059747" comment="kdebase3 less than 3.5.1-69.75.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059740" comment="kdebase3-beagle less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059741" comment="kdebase3-devel less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059749" comment="kdebase3-extra less than 3.5.1-69.75.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059750" comment="kdebase3-nsplugin64 less than 3.5.1-69.75.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 79a7a6d69e310c4db79b45a47b5e8ec7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059752" comment="fileshareset less than 2.0-84.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059753" comment="kdebase3-32bit less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059762" comment="kdebase3-64bit less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059755" comment="kdebase3-devel less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059763" comment="kdebase3-extra less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059756" comment="kdebase3-kdm less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059757" comment="kdebase3-ksysguardd less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059764" comment="kdebase3-nsplugin64 less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059758" comment="kdebase3-nsplugin less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059759" comment="kdebase3-samba less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059760" comment="kdebase3-session less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059765" comment="kdebase3-x86 less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059761" comment="kdebase3 less than 3.5.1-69.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059752" comment="fileshareset less than 2.0-84.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059753" comment="kdebase3-32bit less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059755" comment="kdebase3-devel less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059763" comment="kdebase3-extra less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059756" comment="kdebase3-kdm less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059757" comment="kdebase3-ksysguardd less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059764" comment="kdebase3-nsplugin64 less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059758" comment="kdebase3-nsplugin less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059759" comment="kdebase3-samba less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059760" comment="kdebase3-session less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059761" comment="kdebase3 less than 3.5.1-69.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059754" comment="kdebase3-beagle less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059755" comment="kdebase3-devel less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059763" comment="kdebase3-extra less than 3.5.1-69.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059764" comment="kdebase3-nsplugin64 less than 3.5.1-69.77.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0540</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-0540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0540" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, allows remote attackers to hijack the authentication of administrators for requests that change settings.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58f92f1602b118d40cc39ae74d76028f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
		</criteria>
	</criteria>
	<!-- f9598c04d95b42f071c19e519984ca37 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0542</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0542" source="CVE"/>
	<description>
	The _WriteProlog function in texttops.c in texttops in the Text Filter subsystem in CUPS before 1.4.4 does not check the return values of certain calloc calls, which allows remote attackers to cause a denial of service (NULL pointer dereference or heap memory corruption) or possibly execute arbitrary code via a crafted file.
	</description>
 </metadata>
<!-- d80f195def5f87d532c424567f8d8cea -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064817" comment="cups-libs-64bit less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064818" comment="cups-libs-x86 less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43b8b05c55d382480892b8e819985ce5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059361" comment="cifs-mount less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059373" comment="libmsrpc-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059374" comment="libmsrpc less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059362" comment="libsmbclient-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059363" comment="libsmbclient-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059364" comment="libsmbclient less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059365" comment="samba-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059366" comment="samba-client-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059367" comment="samba-client less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059368" comment="samba-krb-printing less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059380" comment="samba-python less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059369" comment="samba-vscan less than 0.3.6b-42.85.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059370" comment="samba-winbind-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059371" comment="samba-winbind less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059372" comment="samba less than 3.0.32-0.18"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059373" comment="libmsrpc-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059374" comment="libmsrpc less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059363" comment="libsmbclient-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059384" comment="libsmbsharemodes-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059385" comment="libsmbsharemodes less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059380" comment="samba-python less than 3.0.32-0.18"/>
			</criteria>
		</criteria></criteria>
	<!-- fa6455f54a922a4b9e9c2e1b755db9f5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059386" comment="cifs-mount less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059387" comment="ldapsmb less than 1.34b-25.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059399" comment="libmsrpc-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059400" comment="libmsrpc less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059388" comment="libsmbclient-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059401" comment="libsmbclient-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059389" comment="libsmbclient-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059402" comment="libsmbclient-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059390" comment="libsmbclient less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059391" comment="samba-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059403" comment="samba-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059392" comment="samba-client-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059404" comment="samba-client-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059405" comment="samba-client-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059393" comment="samba-client less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059394" comment="samba-krb-printing less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059406" comment="samba-python less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059395" comment="samba-vscan less than 0.3.6b-43.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059396" comment="samba-winbind-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059407" comment="samba-winbind-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059408" comment="samba-winbind-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059397" comment="samba-winbind less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059409" comment="samba-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059398" comment="samba less than 3.0.36-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059386" comment="cifs-mount less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059387" comment="ldapsmb less than 1.34b-25.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059399" comment="libmsrpc-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059400" comment="libmsrpc less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059388" comment="libsmbclient-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059389" comment="libsmbclient-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059390" comment="libsmbclient less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059391" comment="samba-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059392" comment="samba-client-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059393" comment="samba-client less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059394" comment="samba-krb-printing less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059406" comment="samba-python less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059395" comment="samba-vscan less than 0.3.6b-43.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059396" comment="samba-winbind-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059397" comment="samba-winbind less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059398" comment="samba less than 3.0.36-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059399" comment="libmsrpc-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059400" comment="libmsrpc less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059389" comment="libsmbclient-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059410" comment="libsmbsharemodes-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059411" comment="libsmbsharemodes less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059406" comment="samba-python less than 3.0.36-0.9.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0624</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0624" source="CVE"/>
	<description>
	Heap-based buffer overflow in the rmt_read__ function in lib/rtapelib.c in the rmt client functionality in GNU tar before 1.23 and GNU cpio before 2.11 allows remote rmt servers to cause a denial of service (memory corruption) or possibly execute arbitrary code by sending more data than was requested, related to archive filenames that contain a : (colon) character.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a9a8923163bf15a7b362029b28403f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060136" comment="cpio less than 2.6-19.26.1"/>
	</criteria>
	<!-- 237f45f6ed85d324a9d45daadd2e66fd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060037" comment="tar less than 1.15.1-23.16.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0654</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0654" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 permit cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote attackers to obtain sensitive information via a crafted document.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0733</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0733" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0733" source="CVE"/>
	<description>
	Integer overflow in src/backend/executor/nodeHash.c in PostgreSQL 8.4.1 and earlier, and 8.5 through 8.5alpha2, allows remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with many LEFT JOIN clauses, related to certain hashtable size calculations.
	</description>
 </metadata>
<!-- 6bdf69d7fb74ed93841ee668250b20e3 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061299" comment="postgresql-libs-64bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061300" comment="postgresql-libs-x86 less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0739</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0739" source="CVE"/>
	<description>
	Integer overflow in the predospecial function in dospecial.c in dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote attackers to execute arbitrary code via a crafted DVI file that triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- fe2b0b79a120e78a91e39517628cfa61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060488" comment="te_ams less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060489" comment="te_cont less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060490" comment="te_dvilj less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060491" comment="te_eplai less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060492" comment="te_kpath less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060493" comment="te_latex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060494" comment="te_mpost less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060495" comment="te_omega less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060496" comment="te_ptex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060497" comment="te_web less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060498" comment="tetex less than 3.0-37.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0743</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0743" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) 1.0.3, 0.9.5, and earlier and (2) iSCSI Enterprise Target (aka iscsitarget) 0.4.16 allow remote attackers to cause a denial of service (tgtd daemon crash) or possibly have unspecified other impact via vectors that involve the isns_attr_query and qry_rsp_handle functions, and are related to (a) client appearance and (b) client disappearance messages.
	</description>
 </metadata>
<!-- 7816938631e6d4f1a885eea4f161d213 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062620" comment="iscsitarget less than 0.4.17-3.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0771</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0771" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-3552.  Reason: This candidate is a reservation duplicate of CVE-2010-3552.  Notes: All CVE users should reference CVE-2010-3552 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8d66847a4ae8caca98e746ff78880e0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0787</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787" source="CVE"/>
	<description>
	client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29eb70d58d45c14009af67c3e137b8fe -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060962" comment="cifs-mount less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060963" comment="ldapsmb less than 1.34b-25.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060975" comment="libmsrpc-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060976" comment="libmsrpc less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060964" comment="libsmbclient-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060977" comment="libsmbclient-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060965" comment="libsmbclient-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060978" comment="libsmbclient-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060966" comment="libsmbclient less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060967" comment="samba-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060979" comment="samba-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060968" comment="samba-client-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060980" comment="samba-client-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060981" comment="samba-client-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060969" comment="samba-client less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060970" comment="samba-krb-printing less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060982" comment="samba-python less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060971" comment="samba-vscan less than 0.3.6b-43.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060972" comment="samba-winbind-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060983" comment="samba-winbind-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060984" comment="samba-winbind-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060973" comment="samba-winbind less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060985" comment="samba-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060974" comment="samba less than 3.0.36-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060962" comment="cifs-mount less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060963" comment="ldapsmb less than 1.34b-25.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060975" comment="libmsrpc-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060976" comment="libmsrpc less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060964" comment="libsmbclient-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060965" comment="libsmbclient-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060966" comment="libsmbclient less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060967" comment="samba-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060968" comment="samba-client-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060969" comment="samba-client less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060970" comment="samba-krb-printing less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060982" comment="samba-python less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060971" comment="samba-vscan less than 0.3.6b-43.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060972" comment="samba-winbind-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060973" comment="samba-winbind less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060974" comment="samba less than 3.0.36-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060975" comment="libmsrpc-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060976" comment="libmsrpc less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060965" comment="libsmbclient-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060986" comment="libsmbsharemodes-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060987" comment="libsmbsharemodes less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060982" comment="samba-python less than 3.0.36-0.11.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7647f10c23183441620c089dfae68cd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104335" comment="cifs-mount less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104336" comment="libmsrpc-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104337" comment="libmsrpc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104338" comment="libsmbclient-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104339" comment="libsmbclient-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104340" comment="libsmbclient less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104341" comment="samba-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104342" comment="samba-client-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104343" comment="samba-client less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104344" comment="samba-doc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104345" comment="samba-krb-printing less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104346" comment="samba-python less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104347" comment="samba-vscan less than 0.3.6b-42.85.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104348" comment="samba-winbind-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104349" comment="samba-winbind less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104350" comment="samba less than 3.0.32-0.20.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0788</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0788" source="CVE"/>
	<description>
	ncpfs 2.2.6 allows local users to cause a denial of service, obtain sensitive information, or possibly gain privileges via symlink attacks involving the (1) ncpmount and (2) ncpumount programs.
	</description>
 </metadata>
<!-- 893bc8b94e0875f06794074cdd2aaa26 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060664" comment="ncpfs-devel less than 2.2.6-24.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060663" comment="ncpfs less than 2.2.6-24.17.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060664" comment="ncpfs-devel less than 2.2.6-24.17.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0790</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0790" source="CVE"/>
	<description>
	sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name.
	</description>
 </metadata>
<!-- 893bc8b94e0875f06794074cdd2aaa26 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060664" comment="ncpfs-devel less than 2.2.6-24.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060663" comment="ncpfs less than 2.2.6-24.17.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060664" comment="ncpfs-devel less than 2.2.6-24.17.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0791</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0791" source="CVE"/>
	<description>
	The (1) ncpmount, (2) ncpumount, and (3) ncplogin programs in ncpfs 2.2.6 do not properly create lock files, which allows local users to cause a denial of service (application failure) via unspecified vectors that trigger the creation of a /etc/mtab~ file that persists after the program exits.
	</description>
 </metadata>
<!-- 893bc8b94e0875f06794074cdd2aaa26 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060664" comment="ncpfs-devel less than 2.2.6-24.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060663" comment="ncpfs less than 2.2.6-24.17.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060664" comment="ncpfs-devel less than 2.2.6-24.17.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0827</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0827" source="CVE"/>
	<description>
	Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted virtual font (VF) file associated with a DVI file.
	</description>
 </metadata>
<!-- fe2b0b79a120e78a91e39517628cfa61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060488" comment="te_ams less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060489" comment="te_cont less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060490" comment="te_dvilj less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060491" comment="te_eplai less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060492" comment="te_kpath less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060493" comment="te_latex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060494" comment="te_mpost less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060495" comment="te_omega less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060496" comment="te_ptex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060497" comment="te_web less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060498" comment="tetex less than 3.0-37.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0829</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0829" source="CVE"/>
	<description>
	Multiple array index errors in set.c in dvipng 1.11 and 1.12, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a malformed DVI file.
	</description>
 </metadata>
<!-- fe2b0b79a120e78a91e39517628cfa61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060488" comment="te_ams less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060489" comment="te_cont less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060490" comment="te_dvilj less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060491" comment="te_eplai less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060492" comment="te_kpath less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060493" comment="te_latex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060494" comment="te_mpost less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060495" comment="te_omega less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060496" comment="te_ptex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060497" comment="te_web less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060498" comment="tetex less than 3.0-37.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0830</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0830" source="CVE"/>
	<description>
	Integer signedness error in the elf_get_dynamic_info function in elf/dynamic-link.h in ld.so in the GNU C Library (aka glibc or libc6) 2.0.1 through 2.11.1, when the --verify option is used, allows user-assisted remote attackers to execute arbitrary code via a crafted ELF program with a negative value for a certain d_tag structure member in the ELF header.
	</description>
 </metadata>
<!-- a7e1bffd1e2cae6bb5c9bbff3d3f9de2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070518" comment="glibc-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070519" comment="glibc-devel-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070520" comment="glibc-locale-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070521" comment="glibc-locale-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070526" comment="glibc-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070527" comment="glibc-dceext-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070528" comment="glibc-dceext-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070529" comment="glibc-dceext-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070530" comment="glibc-dceext less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0837</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0837" source="CVE"/>
	<description>
	Unspecified vulnerability in the Pack200 component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0838</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0838" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0, Update, and 23 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a stack-based buffer overflow using an untrusted size value in the readMabCurveData function in the CMM module in the JVM.
	</description>
 </metadata>
<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0839</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0839" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0840</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0840" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is related to improper checks when executing privileged methods in the Java Runtime Environment (JRE), which allows attackers to execute arbitrary code via (1) an untrusted object that extends the trusted class but has not modified a certain method, or (2) "a similar trust issue with interfaces," aka "Trusted Methods Chaining Remote Code Execution Vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0841</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0841" source="CVE"/>
	<description>
	Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, and 1.4.2_25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the Java Runtime Environment that allows remote attackers to execute arbitrary code via a JPEG image that contains subsample dimensions with large values, related to JPEGImageReader and "stepX".
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0842</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0842" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an uncontrolled array index that allows remote attackers to execute arbitrary code via a MIDI file with a crafted MixerSequencer object, related to the GM_Song structure.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0843</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0843" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is related to XNewPtr and improper handling of an integer parameter when allocating heap memory in the com.sun.media.sound libraries, which allows remote attackers to execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0844</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0844" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is for improper parsing of a crafted MIDI stream when creating a MixerSequencer object, which causes a pointer to be corrupted and allows a NULL byte to be written to arbitrary memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0846</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0846" source="CVE"/>
	<description>
	Unspecified vulnerability in the ImageIO component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows remote attackers to execute arbitrary code, related to an "invalid assignment" and inconsistent length values in a JPEG image encoder (JPEGImageEncoderImpl).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0847</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0847" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow that allows arbitrary code execution via a crafted image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0848</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0848" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0849</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-0849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0849" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java 2D component in Oracle Java SE and Java for Business 6 Update 18, 5.0 Update 23, 1.4.2_25, and 1.3.1_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the March 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is a heap-based buffer overflow in a decoding routine used by the JPEGImageDecoderImpl interface, which allows code execution via a crafted JPEG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 007dc44543b7ce6fba030305bae1e4b8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062189" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.5-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062192" comment="java-1_4_2-ibm less than 1.4.2_sr13.5-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b591511d815dc7c85fac2e9b6b66d53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061154" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061145" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061150" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061151" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061143" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061144" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061147" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061148" comment="java-1_5_0-ibm-devel less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061149" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr11.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061153" comment="java-1_5_0-ibm less than 1.5.0_sr11.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20100926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-0926</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-0926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0926" source="CVE"/>
	<description>
	The default configuration of smbd in Samba before 3.3.11, 3.4.x before 3.4.6, and 3.5.x before 3.5.0rc3, when a writable share exists, allows remote authenticated users to leverage a directory traversal vulnerability, and access arbitrary files, by using the symlink command in smbclient to create a symlink containing .. (dot dot) sequences, related to the combination of the unix extensions and wide links options.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43b8b05c55d382480892b8e819985ce5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059361" comment="cifs-mount less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059373" comment="libmsrpc-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059374" comment="libmsrpc less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059362" comment="libsmbclient-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059363" comment="libsmbclient-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059364" comment="libsmbclient less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059365" comment="samba-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059366" comment="samba-client-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059367" comment="samba-client less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059368" comment="samba-krb-printing less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059380" comment="samba-python less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059369" comment="samba-vscan less than 0.3.6b-42.85.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059370" comment="samba-winbind-32bit less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059371" comment="samba-winbind less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059372" comment="samba less than 3.0.32-0.18"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059373" comment="libmsrpc-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059374" comment="libmsrpc less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059363" comment="libsmbclient-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059384" comment="libsmbsharemodes-devel less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059385" comment="libsmbsharemodes less than 3.0.32-0.18"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059380" comment="samba-python less than 3.0.32-0.18"/>
			</criteria>
		</criteria></criteria>
	<!-- fa6455f54a922a4b9e9c2e1b755db9f5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059386" comment="cifs-mount less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059387" comment="ldapsmb less than 1.34b-25.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059399" comment="libmsrpc-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059400" comment="libmsrpc less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059388" comment="libsmbclient-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059401" comment="libsmbclient-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059389" comment="libsmbclient-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059402" comment="libsmbclient-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059390" comment="libsmbclient less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059391" comment="samba-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059403" comment="samba-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059392" comment="samba-client-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059404" comment="samba-client-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059405" comment="samba-client-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059393" comment="samba-client less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059394" comment="samba-krb-printing less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059406" comment="samba-python less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059395" comment="samba-vscan less than 0.3.6b-43.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059396" comment="samba-winbind-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059407" comment="samba-winbind-64bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059408" comment="samba-winbind-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059397" comment="samba-winbind less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059409" comment="samba-x86 less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059398" comment="samba less than 3.0.36-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059386" comment="cifs-mount less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059387" comment="ldapsmb less than 1.34b-25.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059399" comment="libmsrpc-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059400" comment="libmsrpc less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059388" comment="libsmbclient-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059389" comment="libsmbclient-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059390" comment="libsmbclient less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059391" comment="samba-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059392" comment="samba-client-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059393" comment="samba-client less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059394" comment="samba-krb-printing less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059406" comment="samba-python less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059395" comment="samba-vscan less than 0.3.6b-43.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059396" comment="samba-winbind-32bit less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059397" comment="samba-winbind less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059398" comment="samba less than 3.0.36-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059399" comment="libmsrpc-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059400" comment="libmsrpc less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059389" comment="libsmbclient-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059410" comment="libsmbsharemodes-devel less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059411" comment="libsmbsharemodes less than 3.0.36-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059406" comment="samba-python less than 3.0.36-0.9.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1000</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1000" source="CVE"/>
	<description>
	Directory traversal vulnerability in KGet in KDE SC 4.0.0 through 4.4.3 allows remote attackers to create arbitrary files via directory traversal sequences in the name attribute of a file element in a metalink file.
	</description>
 </metadata>
<!-- 61a3b641a9c4e4c8f62b44bd9c2160a0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065304" comment="kdenetwork3-IRC less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065300" comment="kdenetwork3-InstantMessenger less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065305" comment="kdenetwork3-dialup less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065306" comment="kdenetwork3-lan less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065307" comment="kdenetwork3-lisa less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065301" comment="kdenetwork3-news less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065308" comment="kdenetwork3-query less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065302" comment="kdenetwork3-vnc less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065309" comment="kdenetwork3-wireless less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065303" comment="kdenetwork3 less than 3.5.1-32.34.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065304" comment="kdenetwork3-IRC less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065305" comment="kdenetwork3-dialup less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065306" comment="kdenetwork3-lan less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065307" comment="kdenetwork3-lisa less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065308" comment="kdenetwork3-query less than 3.5.1-32.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065309" comment="kdenetwork3-wireless less than 3.5.1-32.34.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1083</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1083" source="CVE"/>
	<description>
	The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel 2.6.x through 2.6.32, and possibly other versions, does not clear the transfer buffer before returning to userspace when a USB command fails, which might make it easier for physically proximate attackers to obtain sensitive information (kernel memory).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30110847005ad3a7ea7c5d1efd067ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 37bb490b2d9ca27c1027e09c0453381c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060291" comment="kernel-default less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060294" comment="kernel-smp less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060292" comment="kernel-source less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060293" comment="kernel-syms less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e02dcbe650533bbc5c4aeb6300f0d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060299" comment="kernel-xenpae less than 2.6.16.60-0.42.10"/>
		</criteria>
	</criteria>
	<!-- 44be42f54c5e35e6e551e68351bbd0e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059220" comment="kernel-bigsmp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059222" comment="kernel-kdumppae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059223" comment="kernel-vmi less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059224" comment="kernel-vmipae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9a1d7bed362eab0ffb8a1cfcb944439e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059204" comment="kernel-iseries64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059206" comment="kernel-ppc64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
	<!-- d5a23ca2612948125ba212f86484077b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
		</criteria>
	</criteria>
	<!-- e7da2abdeaf19e694fa26d810aaab118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ef2b9d5d6bc17682fa94fd4898564773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ffb169f8e0b809058bff6cb318c6a511 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1086</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1086" source="CVE"/>
	<description>
	The ULE decapsulation functionality in drivers/media/dvb/dvb-core/dvb_net.c in dvb-core in Linux kernel 2.6.33 and earlier allows attackers to cause a denial of service (infinite loop) via a crafted MPEG2-TS frame, related to an invalid Payload Pointer ULE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30110847005ad3a7ea7c5d1efd067ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 37bb490b2d9ca27c1027e09c0453381c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060291" comment="kernel-default less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060294" comment="kernel-smp less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060292" comment="kernel-source less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060293" comment="kernel-syms less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e02dcbe650533bbc5c4aeb6300f0d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060299" comment="kernel-xenpae less than 2.6.16.60-0.42.10"/>
		</criteria>
	</criteria>
	<!-- 44be42f54c5e35e6e551e68351bbd0e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059220" comment="kernel-bigsmp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059222" comment="kernel-kdumppae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059223" comment="kernel-vmi less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059224" comment="kernel-vmipae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9a1d7bed362eab0ffb8a1cfcb944439e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059204" comment="kernel-iseries64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059206" comment="kernel-ppc64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
	<!-- d5a23ca2612948125ba212f86484077b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
		</criteria>
	</criteria>
	<!-- e7da2abdeaf19e694fa26d810aaab118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ef2b9d5d6bc17682fa94fd4898564773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ffb169f8e0b809058bff6cb318c6a511 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1087</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1087" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1087" source="CVE"/>
	<description>
	The nfs_wait_on_request function in fs/nfs/pagelist.c in Linux kernel 2.6.x through 2.6.33-rc5 allows attackers to cause a denial of service (Oops) via unknown vectors related to truncating a file and an operation that is not interruptible.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a48d2bb88f09ec2cfa4e6dda5d9eeef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061989" comment="kernel-debug less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061984" comment="kernel-default less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061990" comment="kernel-kdump less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061985" comment="kernel-smp less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061986" comment="kernel-source less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061987" comment="kernel-syms less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061988" comment="kernel-xen less than 2.6.16.60-0.67.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061989" comment="kernel-debug less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061990" comment="kernel-kdump less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061988" comment="kernel-xen less than 2.6.16.60-0.67.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2ddbc5246b6c31bb9c436e267960e2b2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061984" comment="kernel-default less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061991" comment="kernel-iseries64 less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061990" comment="kernel-kdump less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061992" comment="kernel-ppc64 less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061986" comment="kernel-source less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061987" comment="kernel-syms less than 2.6.16.60-0.67.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061990" comment="kernel-kdump less than 2.6.16.60-0.67.1"/>
		</criteria></criteria>
	<!-- 3d5c445b4e7877667872f4260fcbae93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061993" comment="kernel-bigsmp less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061989" comment="kernel-debug less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061984" comment="kernel-default less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061990" comment="kernel-kdump less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061995" comment="kernel-kdumppae less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061985" comment="kernel-smp less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061986" comment="kernel-source less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061987" comment="kernel-syms less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061996" comment="kernel-vmi less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061997" comment="kernel-vmipae less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061988" comment="kernel-xen less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061994" comment="kernel-xenpae less than 2.6.16.60-0.67.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061989" comment="kernel-debug less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061990" comment="kernel-kdump less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061988" comment="kernel-xen less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061994" comment="kernel-xenpae less than 2.6.16.60-0.67.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4a3fded4eb5cc8080a15b02eaa089c3b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061989" comment="kernel-debug less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061984" comment="kernel-default less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061986" comment="kernel-source less than 2.6.16.60-0.67.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061987" comment="kernel-syms less than 2.6.16.60-0.67.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061989" comment="kernel-debug less than 2.6.16.60-0.67.1"/>
		</criteria></criteria>
	<!-- ee832cd848f9a89483b4ebc3816401e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061984" comment="kernel-default less than 2.6.16.60-0.67.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061986" comment="kernel-source less than 2.6.16.60-0.67.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061987" comment="kernel-syms less than 2.6.16.60-0.67.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1088</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP2</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1088" source="CVE"/>
	<description>
	fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30110847005ad3a7ea7c5d1efd067ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 37bb490b2d9ca27c1027e09c0453381c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp2-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060291" comment="kernel-default less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060294" comment="kernel-smp less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060292" comment="kernel-source less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060293" comment="kernel-syms less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e02dcbe650533bbc5c4aeb6300f0d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060295" comment="kernel-xen less than 2.6.16.60-0.42.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060299" comment="kernel-xenpae less than 2.6.16.60-0.42.10"/>
		</criteria>
	</criteria>
	<!-- 44be42f54c5e35e6e551e68351bbd0e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059220" comment="kernel-bigsmp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059222" comment="kernel-kdumppae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059217" comment="kernel-smp less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059223" comment="kernel-vmi less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059224" comment="kernel-vmipae less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059218" comment="kernel-xen less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059221" comment="kernel-xenpae less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9a1d7bed362eab0ffb8a1cfcb944439e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059204" comment="kernel-iseries64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059206" comment="kernel-ppc64 less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059205" comment="kernel-kdump less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
	<!-- d5a23ca2612948125ba212f86484077b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
		</criteria>
	</criteria>
	<!-- e7da2abdeaf19e694fa26d810aaab118 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060296" comment="kernel-debug less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ef2b9d5d6bc17682fa94fd4898564773 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060297" comment="kernel-kdump less than 2.6.16.60-0.42.10"/>
	</criteria>
	<!-- ffb169f8e0b809058bff6cb318c6a511 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059203" comment="kernel-default less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059207" comment="kernel-source less than 2.6.16.60-0.60.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059208" comment="kernel-syms less than 2.6.16.60-0.60.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009059219" comment="kernel-debug less than 2.6.16.60-0.60.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1121</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1121" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1121" source="CVE"/>
	<description>
	Mozilla Firefox 3.6.x before 3.6.3 does not properly manage the scopes of DOM nodes that are moved from one document to another, which allows remote attackers to conduct use-after-free attacks and execute arbitrary code via unspecified vectors involving improper interaction with garbage collection, as demonstrated by Nils during a Pwn2Own competition at CanSecWest 2010.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1125</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1125" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1125" source="CVE"/>
	<description>
	The JavaScript implementation in Mozilla Firefox 3.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to send selected keystrokes to a form field in a hidden frame, instead of the intended form field in a visible frame, via certain calls to the focus method.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1157</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1157" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
	</description>
 </metadata>
<!-- 3793d545020770468c203596abe564e1 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062690" comment="tomcat5-admin-webapps less than 5.5.27-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062691" comment="tomcat5-webapps less than 5.5.27-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062692" comment="tomcat5 less than 5.5.27-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1166" source="CVE"/>
	<description>
	The fbComposite function in fbpict.c in the Render extension in the X server in X.Org X11R7.1 allows remote authenticated users to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted request, related to an incorrect macro definition.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7d857f13d5fd490cc6b79ed6f79d13f4 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061233" comment="xorg-x11-Xnest less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061234" comment="xorg-x11-Xvfb less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061235" comment="xorg-x11-Xvnc less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061236" comment="xorg-x11-devel-32bit less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061249" comment="xorg-x11-devel-64bit less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061237" comment="xorg-x11-devel less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061250" comment="xorg-x11-doc less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061238" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061239" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061240" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061241" comment="xorg-x11-fonts-scalable less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061242" comment="xorg-x11-fonts-syriac less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061243" comment="xorg-x11-libs-32bit less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061251" comment="xorg-x11-libs-64bit less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061252" comment="xorg-x11-libs-x86 less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061244" comment="xorg-x11-libs less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061245" comment="xorg-x11-man less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061253" comment="xorg-x11-sdk less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061246" comment="xorg-x11-server-glx less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061247" comment="xorg-x11-server less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061248" comment="xorg-x11 less than 6.9.0-50.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061233" comment="xorg-x11-Xnest less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061234" comment="xorg-x11-Xvfb less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061235" comment="xorg-x11-Xvnc less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061236" comment="xorg-x11-devel-32bit less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061237" comment="xorg-x11-devel less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061250" comment="xorg-x11-doc less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061238" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061239" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061240" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061241" comment="xorg-x11-fonts-scalable less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061242" comment="xorg-x11-fonts-syriac less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061243" comment="xorg-x11-libs-32bit less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061244" comment="xorg-x11-libs less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061245" comment="xorg-x11-man less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061253" comment="xorg-x11-sdk less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061246" comment="xorg-x11-server-glx less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061247" comment="xorg-x11-server less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061248" comment="xorg-x11 less than 6.9.0-50.66.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061234" comment="xorg-x11-Xvfb less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061250" comment="xorg-x11-doc less than 6.9.0-50.66.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061253" comment="xorg-x11-sdk less than 6.9.0-50.66.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ba31a309e8cde77800f42a751dbf7be3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063288" comment="xorg-x11-Xvnc less than 6.9.0-50.67.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063289" comment="xorg-x11-server less than 6.9.0-50.67.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1168</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1168" source="CVE"/>
	<description>
	The Safe (aka Safe.pm) module before 2.25 for Perl allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving implicitly called methods and implicitly blessed objects, as demonstrated by the (a) DESTROY and (b) AUTOLOAD methods, related to "automagic methods."
	</description>
 </metadata>
<!-- 2f57d71a8b5aeb1c7fe200a680ffbc15 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062015" comment="perl-32bit less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062017" comment="perl-64bit less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062018" comment="perl-x86 less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062016" comment="perl less than 5.8.8-14.15.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062015" comment="perl-32bit less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062016" comment="perl less than 5.8.8-14.15.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1169</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1169" source="CVE"/>
	<description>
	PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
	</description>
 </metadata>
<!-- 6bdf69d7fb74ed93841ee668250b20e3 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061299" comment="postgresql-libs-64bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061300" comment="postgresql-libs-x86 less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1170" source="CVE"/>
	<description>
	The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
	</description>
 </metadata>
<!-- 6bdf69d7fb74ed93841ee668250b20e3 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061299" comment="postgresql-libs-64bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061300" comment="postgresql-libs-x86 less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1173</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1173" source="CVE"/>
	<description>
	The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1196" source="CVE"/>
	<description>
	Integer overflow in the nsGenericDOMDataNode::SetTextInternal function in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a DOM node with a long text value that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1197</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1197" source="CVE"/>
	<description>
	Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, does not properly handle situations in which both "Content-Disposition: attachment" and "Content-Type: multipart" are present in HTTP headers, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an uploaded HTML document.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1198</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1198" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, and SeaMonkey before 2.0.5, allows remote attackers to execute arbitrary code via vectors involving multiple plugin instances.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1199</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1199" source="CVE"/>
	<description>
	Integer overflow in the XSLT node sorting implementation in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to execute arbitrary code via a large text value for a node.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1200</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1200" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1201</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1201" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.10, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1202</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1202" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the JavaScript engine in Mozilla Firefox 3.5.x before 3.5.10 and 3.6.x before 3.6.4, Thunderbird before 3.0.5, and SeaMonkey before 2.0.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1203</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1203" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox 3.6.x before 3.6.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger an assertion failure in jstracer.cpp.
	</description>
 </metadata>
<!-- a8d90b51fe9f6e085ade64278ece8e87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061260" comment="MozillaFirefox-translations less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061261" comment="MozillaFirefox less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061262" comment="mozilla-xulrunner191-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061263" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061264" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061265" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061266" comment="mozilla-xulrunner191-translations less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061267" comment="mozilla-xulrunner191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061268" comment="MozillaFirefox-branding-upstream less than 3.5.10-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061269" comment="mozilla-xulrunner191-devel less than 1.9.1.10-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061270" comment="python-xpcom191 less than 1.9.1.10-1.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1205</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1205" source="CVE"/>
	<description>
	Buffer overflow in pngpread.c in libpng before 1.2.44 and 1.4.x before 1.4.3, as used in progressive applications, might allow remote attackers to execute arbitrary code via a PNG image that triggers an additional data row.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37055a3106d59423dce730c76401a58e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062300" comment="libpng-32bit less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062304" comment="libpng-64bit less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062301" comment="libpng-devel-32bit less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062305" comment="libpng-devel-64bit less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062302" comment="libpng-devel less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062306" comment="libpng-x86 less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062303" comment="libpng less than 1.2.8-19.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062300" comment="libpng-32bit less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062301" comment="libpng-devel-32bit less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062302" comment="libpng-devel less than 1.2.8-19.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062303" comment="libpng less than 1.2.8-19.29.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1206</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1206" source="CVE"/>
	<description>
	The startDocumentLoad function in browser/base/content/browser.js in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, does not properly implement the Same Origin Policy in certain circumstances related to the about:blank document and a document that is currently loading, which allows (1) remote web servers to conduct spoofing attacks via vectors involving a 204 (aka No Content) status code, and allows (2) remote attackers to conduct spoofing attacks via vectors involving a window.stop call.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1208</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1208" source="CVE"/>
	<description>
	Use-after-free vulnerability in the attribute-cloning functionality in the DOM implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via vectors related to deletion of an event attribute node with a nonzero reference count.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1209</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1209" source="CVE"/>
	<description>
	Use-after-free vulnerability in the NodeIterator implementation in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via a crafted NodeFilter that detaches DOM nodes, related to the NodeIterator interface and a javascript callback.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1211</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1211" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1211" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1213</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1213" source="CVE"/>
	<description>
	The importScripts Web Worker method in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not verify that content is valid JavaScript code, which allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted HTML document.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1214</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1214" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to execute arbitrary code via plugin content with many parameter elements.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1311</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP2</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1311" source="CVE"/>
	<description>
	The qtm_decompress function in libclamav/mspack.c in ClamAV before 0.96 allows remote attackers to cause a denial of service (memory corruption and application crash) via a crafted CAB archive that uses the Quantum (aka .Q) compression format.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0fe0a47e2d9e4a6160a308a56172d457 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059973" comment="clamav less than 0.96-0.6.1"/>
	</criteria>
	<!-- dc27506bfedbec1089a0ef7029bb8f5d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009059845" comment="clamav less than 0.96-0.4.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1321</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-1321" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1321" source="CVE"/>
	<description>
	The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator's checksum field is missing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8451c9123666d5000536667668ce491d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067766" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067767" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067768" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067769" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.13"/>
		</criteria>
	</criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
	<!-- 98e73dbf4ebe271749566a160f8cbf53 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060762" comment="krb5-32bit less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060767" comment="krb5-64bit less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060768" comment="krb5-apps-clients less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060769" comment="krb5-apps-servers less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060763" comment="krb5-client less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060764" comment="krb5-devel-32bit less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060770" comment="krb5-devel-64bit less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060765" comment="krb5-devel less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060771" comment="krb5-server less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060772" comment="krb5-x86 less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060766" comment="krb5 less than 1.4.3-19.45.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060762" comment="krb5-32bit less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060768" comment="krb5-apps-clients less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060769" comment="krb5-apps-servers less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060763" comment="krb5-client less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060764" comment="krb5-devel-32bit less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060765" comment="krb5-devel less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060771" comment="krb5-server less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060766" comment="krb5 less than 1.4.3-19.45.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060768" comment="krb5-apps-clients less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060769" comment="krb5-apps-servers less than 1.4.3-19.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060771" comment="krb5-server less than 1.4.3-19.45.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c4e94000cf9daf61d2273c8fa5dd22c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066038" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066039" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066040" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066041" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066038" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066041" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c6533e0368b2b223506fedc65580c4ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104351" comment="krb5-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104352" comment="krb5-apps-clients less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104353" comment="krb5-apps-servers less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104354" comment="krb5-client less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104355" comment="krb5-devel-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104356" comment="krb5-devel less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104357" comment="krb5-server less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104358" comment="krb5 less than 1.4.3-19.43.37.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1323</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1323" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.3.x, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to modify user-visible prompt text, modify a response to a Key Distribution Center (KDC), or forge a KRB-SAFE message via certain checksums that (1) are unkeyed or (2) use RC4 keys.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- c6533e0368b2b223506fedc65580c4ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104351" comment="krb5-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104352" comment="krb5-apps-clients less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104353" comment="krb5-apps-servers less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104354" comment="krb5-client less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104355" comment="krb5-devel-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104356" comment="krb5-devel less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104357" comment="krb5-server less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104358" comment="krb5 less than 1.4.3-19.43.37.1"/>
		</criteria>
	</criteria>
	<!-- d0d5ba0d668fb6a84e2d0628a4a483b9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065142" comment="krb5-64bit less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065145" comment="krb5-devel-64bit less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065147" comment="krb5-x86 less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1324</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1324" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.7.x and 1.8.x through 1.8.3 does not properly determine the acceptability of checksums, which might allow remote attackers to forge GSS tokens, gain privileges, or have unspecified other impact via (1) an unkeyed checksum, (2) an unkeyed PAC checksum, or (3) a KrbFastArmoredReq checksum based on an RC4 key.
	</description>
 </metadata>
<!-- d0d5ba0d668fb6a84e2d0628a4a483b9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065142" comment="krb5-64bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065145" comment="krb5-devel-64bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065147" comment="krb5-x86 less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1411</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1411" source="CVE"/>
	<description>
	Multiple integer overflows in the Fax3SetupState function in tif_fax3.c in the FAX3 decoder in LibTIFF before 3.9.3, as used in ImageIO in Apple Mac OS X 10.5.8 and Mac OS X 10.6 before 10.6.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- a262f09279822d735ca844ce47ac50fc -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060874" comment="libtiff-32bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060877" comment="libtiff-64bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060878" comment="libtiff-devel-32bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060879" comment="libtiff-devel-64bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060875" comment="libtiff-devel less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060880" comment="libtiff-x86 less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060876" comment="libtiff less than 3.8.2-5.18.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060874" comment="libtiff-32bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060878" comment="libtiff-devel-32bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060875" comment="libtiff-devel less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060876" comment="libtiff less than 3.8.2-5.18.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009060878" comment="libtiff-devel-32bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060879" comment="libtiff-devel-64bit less than 3.8.2-5.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009060875" comment="libtiff-devel less than 3.8.2-5.18.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1440</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1440" source="CVE"/>
	<description>
	Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live 2009 and earlier, and teTeX, allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a special command in a DVI file, related to the (1) predospecial and (2) bbdospecial functions, a different vulnerability than CVE-2010-0739.
	</description>
 </metadata>
<!-- fe2b0b79a120e78a91e39517628cfa61 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009060488" comment="te_ams less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060489" comment="te_cont less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060490" comment="te_dvilj less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060491" comment="te_eplai less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060492" comment="te_kpath less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060493" comment="te_latex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060494" comment="te_mpost less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060495" comment="te_omega less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060496" comment="te_ptex less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060497" comment="te_web less than 3.0-37.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009060498" comment="tetex less than 3.0-37.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1447</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1447" source="CVE"/>
	<description>
	The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
	</description>
 </metadata>
<!-- 2f57d71a8b5aeb1c7fe200a680ffbc15 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062015" comment="perl-32bit less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062017" comment="perl-64bit less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062018" comment="perl-x86 less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062016" comment="perl less than 5.8.8-14.15.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062015" comment="perl-32bit less than 5.8.8-14.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062016" comment="perl less than 5.8.8-14.15.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1449</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1449" source="CVE"/>
	<description>
	Integer overflow in rgbimgmodule.c in the rgbimg module in Python 2.5 allows remote attackers to have an unspecified impact via a large image that triggers a buffer overflow.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-3143.12.
	</description>
 </metadata>
<!-- a2098cb2e3d51d63912dc55b837af4c0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065582" comment="python-64bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065585" comment="python-x86 less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1450</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1450" source="CVE"/>
	<description>
	Multiple buffer overflows in the RLE decoder in the rgbimg module in Python 2.5 allow remote attackers to have an unspecified impact via an image file containing crafted data that triggers improper processing within the (1) longimagedata or (2) expandrow function.
	</description>
 </metadata>
<!-- a2098cb2e3d51d63912dc55b837af4c0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065582" comment="python-64bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065585" comment="python-x86 less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1452</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-1452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1452" source="CVE"/>
	<description>
	The (1) mod_cache and (2) mod_dav modules in the Apache HTTP Server 2.2.x before 2.2.16 allow remote attackers to cause a denial of service (process crash) via a request that lacks a path.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5e275ea53de9c9e1156fe626e80e6066 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104359" comment="apache2-devel less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104360" comment="apache2-doc less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104361" comment="apache2-example-pages less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104362" comment="apache2-prefork less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104363" comment="apache2-worker less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104364" comment="apache2 less than 2.2.3-16.25.40"/>
		</criteria>
	</criteria>
	<!-- c1d4ee926550fcf7502509517b2210e4 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070444" comment="apache2-devel less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070445" comment="apache2-doc less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070446" comment="apache2-example-pages less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070447" comment="apache2-prefork less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070448" comment="apache2-worker less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070449" comment="apache2 less than 2.2.3-16.32.35.1"/>
		</criteria>
	</criteria>
	<!-- c3940d73bd140b3d6d6e2d878f94f4f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070438" comment="apache2-devel less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070439" comment="apache2-doc less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070440" comment="apache2-example-pages less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070441" comment="apache2-prefork less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070442" comment="apache2-worker less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070443" comment="apache2 less than 2.2.3-16.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1455</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1455" source="CVE"/>
	<description>
	The DOCSIS dissector in Wireshark 0.9.6 through 1.0.12 and 1.2.0 through 1.2.7 allows user-assisted remote attackers to cause a denial of service (application crash) via a malformed packet trace file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1526</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise 10 SP2 Mono Extension</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1526" source="CVE"/>
	<description>
	Multiple integer overflows in libgdiplus 2.6.7, as used in Mono, allow attackers to execute arbitrary code via (1) a crafted TIFF file, related to the gdip_load_tiff_image function in tiffcodec.c; (2) a crafted JPEG file, related to the gdip_load_jpeg_image_internal function in jpegcodec.c; or (3) a crafted BMP file, related to the gdip_read_bmp_image function in bmpcodec.c, leading to heap-based buffer overflows.
	</description>
 </metadata>
<!-- b3729a04803f0c515f7114062b30b7b5 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063152" comment="libgdiplus less than 1.2.2-13.20.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1585</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1585" source="CVE"/>
	<description>
	The nsIScriptableUnescapeHTML.parseFragment method in the ParanoidFragmentSink protection mechanism in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 does not properly sanitize HTML in a chrome document, which makes it easier for remote attackers to execute arbitrary JavaScript with chrome privileges via a javascript: URI in input to an extension, as demonstrated by a javascript:alert sequence in (1) the HREF attribute of an A element or (2) the ACTION attribute of a FORM element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1623</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-1623" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1623" source="CVE"/>
	<description>
	Memory leak in the apr_brigade_split_line function in buckets/apr_brigade.c in the Apache Portable Runtime Utility library (aka APR-util) before 1.3.10, as used in the mod_reqtimeout module in the Apache HTTP Server and other software, allows remote attackers to cause a denial of service (memory consumption) via unspecified vectors related to the destruction of an APR bucket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 93f3f0fb2aeae6252ba07a3f17184bb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104365" comment="apache2-devel less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104366" comment="apache2-doc less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104367" comment="apache2-example-pages less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104368" comment="apache2-prefork less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104369" comment="apache2-worker less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104370" comment="apache2 less than 2.2.3-16.32.37.1"/>
		</criteria>
	</criteria>
	<!-- e1ffd94f36abf790103d5231ed8ed303 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069411" comment="libapr-util1-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069412" comment="libapr-util1-devel-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069414" comment="libapr-util1 less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069415" comment="libapr1-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069414" comment="libapr-util1 less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069412" comment="libapr-util1-devel-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1624</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1624" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1624" source="CVE"/>
	<description>
	The msn_emoticon_msg function in slp.c in the MSN protocol plugin in libpurple in Pidgin before 2.7.0 allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a custom emoticon in a malformed SLP message.
	</description>
 </metadata>
<!-- b2065553568c70babb437af6b08cc06e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071816" comment="finch-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071813" comment="finch less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071817" comment="libpurple-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071814" comment="libpurple less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071818" comment="pidgin-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071815" comment="pidgin less than 2.6.6-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1626</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1626" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1626" source="CVE"/>
	<description>
	MySQL before 5.1.46 allows local users to delete the data and index files of another user's MyISAM table via a symlink attack in conjunction with the DROP TABLE command, a different vulnerability than CVE-2008-4098 and CVE-2008-7247.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1634</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634" source="CVE"/>
	<description>
	Multiple integer overflows in audioop.c in the audioop module in Python 2.6, 2.7, 3.1, and 3.2 allow context-dependent attackers to cause a denial of service (application crash) via a large fragment, as demonstrated by a call to audioop.lin2lin with a long string in the first argument, leading to a buffer overflow.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3143.5.
	</description>
 </metadata>
<!-- a2098cb2e3d51d63912dc55b837af4c0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065582" comment="python-64bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065585" comment="python-x86 less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1639</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1639" source="CVE"/>
	<description>
	The cli_pdf function in libclamav/pdf.c in ClamAV before 0.96.1 allows remote attackers to cause a denial of service (crash) via a malformed PDF file, related to an inconsistency in the calculated stream length and the real stream length.
	</description>
 </metadata>
<!-- 4848aa7c729bd3ea7adc21be1dee8683 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061757" comment="clamav less than 0.96.1-0.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1640</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1640" source="CVE"/>
	<description>
	Off-by-one error in the parseicon function in libclamav/pe_icons.c in ClamAV 0.96 allows remote attackers to cause a denial of service (crash) via a crafted PE icon that triggers an out-of-bounds read, related to improper rounding during scaling.
	</description>
 </metadata>
<!-- 4848aa7c729bd3ea7adc21be1dee8683 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061757" comment="clamav less than 0.96.1-0.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1642</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-1642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1642" source="CVE"/>
	<description>
	The reply_sesssetup_and_X_spnego function in sesssetup.c in smbd in Samba before 3.4.8 and 3.5.x before 3.5.2 allows remote attackers to trigger an out-of-bounds read, and cause a denial of service (process crash), via a \xff\xff security blob length in a Session Setup AndX request.
	</description>
 </metadata>
<!-- 7647f10c23183441620c089dfae68cd9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104335" comment="cifs-mount less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104336" comment="libmsrpc-devel less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104337" comment="libmsrpc less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104338" comment="libsmbclient-32bit less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104339" comment="libsmbclient-devel less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104340" comment="libsmbclient less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104341" comment="samba-32bit less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104342" comment="samba-client-32bit less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104343" comment="samba-client less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104344" comment="samba-doc less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104345" comment="samba-krb-printing less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104346" comment="samba-python less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104347" comment="samba-vscan less than 0.3.6b-42.85.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104348" comment="samba-winbind-32bit less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104349" comment="samba-winbind less than 3.0.32-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104350" comment="samba less than 3.0.32-0.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1674</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1674" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1674" source="CVE"/>
	<description>
	The extended-community parser in bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed Extended Communities attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 337640d5ca3a5bedf245344775781a8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067087" comment="quagga-devel less than 0.99.9-14.9.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067088" comment="quagga less than 0.99.9-14.9.3"/>
		</criteria>
	</criteria>
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- 7b7402a5f105f244235ede2bf7547a64 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066709" comment="quagga-devel less than 0.99.9-14.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066710" comment="quagga less than 0.99.9-14.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1675</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1675" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1675" source="CVE"/>
	<description>
	bgpd in Quagga before 0.99.18 allows remote attackers to cause a denial of service (session reset) via a malformed AS_PATHLIMIT path attribute.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 337640d5ca3a5bedf245344775781a8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067087" comment="quagga-devel less than 0.99.9-14.9.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067088" comment="quagga less than 0.99.9-14.9.3"/>
		</criteria>
	</criteria>
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- 7b7402a5f105f244235ede2bf7547a64 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066709" comment="quagga-devel less than 0.99.9-14.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066710" comment="quagga less than 0.99.9-14.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1748</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1748" source="CVE"/>
	<description>
	The cgi_initialize_string function in cgi-bin/var.c in the web interface in CUPS before 1.4.4, as used on Apple Mac OS X 10.5.8, Mac OS X 10.6 before 10.6.4, and other platforms, does not properly handle parameter values containing a % (percent) character without two subsequent hex characters, which allows context-dependent attackers to obtain sensitive information from cupsd process memory via a crafted request, as demonstrated by the (1) /admin?OP=redirect&amp;URL=% and (2) /admin?URL=/admin/&amp;OP=% URIs.
	</description>
 </metadata>
<!-- d80f195def5f87d532c424567f8d8cea -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064817" comment="cups-libs-64bit less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064818" comment="cups-libs-x86 less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1797</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1797" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the cff_decoder_parse_charstrings function in the CFF Type2 CharStrings interpreter in cff/cffgload.c in FreeType before 2.4.2, as used in Apple iOS before 4.0.2 on the iPhone and iPod touch and before 3.2.2 on the iPad, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted CFF opcodes in embedded fonts in a PDF document, as demonstrated by JailbreakMe. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1848</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1848" source="CVE"/>
	<description>
	Directory traversal vulnerability in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to bypass intended table grants to read field definitions of arbitrary tables, and on 5.1 to read or delete content of arbitrary tables, via a .. (dot dot) in a table name.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1849</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1849" source="CVE"/>
	<description>
	The my_net_skip_rest function in sql/net_serv.cc in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by sending a large number of packets that exceed the maximum length.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1850</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1850" source="CVE"/>
	<description>
	Buffer overflow in MySQL 5.0 through 5.0.91 and 5.1 before 5.1.47 allows remote authenticated users to execute arbitrary code via a COM_FIELD_LIST command with a long table name.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1866</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1866" source="CVE"/>
	<description>
	The dechunk filter in PHP 5.3 through 5.3.2, when decoding an HTTP chunked encoding stream, allows context-dependent attackers to cause a denial of service (crash) and possibly trigger memory corruption via a negative chunk size, which bypasses a signed comparison, related to an integer overflow in the chunk size decoder.
	</description>
 </metadata>
<!-- a465fef49cd0917e6c11e39749442442 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062613" comment="php5-tidy less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20101975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-1975</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1975" source="CVE"/>
	<description>
	PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement.
	</description>
 </metadata>
<!-- 6bdf69d7fb74ed93841ee668250b20e3 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061299" comment="postgresql-libs-64bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061300" comment="postgresql-libs-x86 less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061295" comment="postgresql-libs-32bit less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061296" comment="postgresql-libs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061297" comment="postgresql-contrib less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061294" comment="postgresql-devel less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061298" comment="postgresql-docs less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061301" comment="postgresql-pl less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061302" comment="postgresql-server less than 8.1.21-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061303" comment="postgresql less than 8.1.21-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2059</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2059" source="CVE"/>
	<description>
	lib/fsm.c in RPM 4.8.0 and unspecified 4.7.x and 4.6.x versions, and RPM before 4.4.3, does not properly reset the metadata of an executable file during replacement of the file in an RPM package upgrade, which might allow local users to gain privileges by creating a hard link to a vulnerable (1) setuid or (2) setgid file.
	</description>
 </metadata>
<!-- a7d1ee708733d0f39ed83acd3080c0f3 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062713" comment="popt-32bit less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062720" comment="popt-64bit less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062714" comment="popt-devel-32bit less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062721" comment="popt-devel-64bit less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062715" comment="popt-devel less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062722" comment="popt-x86 less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062716" comment="popt less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062717" comment="rpm-devel less than 4.4.2-43.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062718" comment="rpm-python less than 4.4.2-43.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062719" comment="rpm less than 4.4.2-43.36.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062713" comment="popt-32bit less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062714" comment="popt-devel-32bit less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062715" comment="popt-devel less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062716" comment="popt less than 1.7-271.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062717" comment="rpm-devel less than 4.4.2-43.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062718" comment="rpm-python less than 4.4.2-43.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062719" comment="rpm less than 4.4.2-43.36.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062717" comment="rpm-devel less than 4.4.2-43.36.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2063</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2063" source="CVE"/>
	<description>
	Buffer overflow in the SMB1 packet chaining implementation in the chain_reply function in process.c in smbd in Samba 3.0.x before 3.3.13 allows remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via a crafted field in a packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29eb70d58d45c14009af67c3e137b8fe -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060962" comment="cifs-mount less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060963" comment="ldapsmb less than 1.34b-25.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060975" comment="libmsrpc-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060976" comment="libmsrpc less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060964" comment="libsmbclient-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060977" comment="libsmbclient-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060965" comment="libsmbclient-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060978" comment="libsmbclient-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060966" comment="libsmbclient less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060967" comment="samba-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060979" comment="samba-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060968" comment="samba-client-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060980" comment="samba-client-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060981" comment="samba-client-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060969" comment="samba-client less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060970" comment="samba-krb-printing less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060982" comment="samba-python less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060971" comment="samba-vscan less than 0.3.6b-43.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060972" comment="samba-winbind-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060983" comment="samba-winbind-64bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060984" comment="samba-winbind-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060973" comment="samba-winbind less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060985" comment="samba-x86 less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060974" comment="samba less than 3.0.36-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060962" comment="cifs-mount less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060963" comment="ldapsmb less than 1.34b-25.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060975" comment="libmsrpc-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060976" comment="libmsrpc less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060964" comment="libsmbclient-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060965" comment="libsmbclient-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060966" comment="libsmbclient less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060967" comment="samba-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060968" comment="samba-client-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060969" comment="samba-client less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060970" comment="samba-krb-printing less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060982" comment="samba-python less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060971" comment="samba-vscan less than 0.3.6b-43.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060972" comment="samba-winbind-32bit less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060973" comment="samba-winbind less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060974" comment="samba less than 3.0.36-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009060975" comment="libmsrpc-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060976" comment="libmsrpc less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060965" comment="libsmbclient-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060986" comment="libsmbsharemodes-devel less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060987" comment="libsmbsharemodes less than 3.0.36-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009060982" comment="samba-python less than 3.0.36-0.11.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7647f10c23183441620c089dfae68cd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104335" comment="cifs-mount less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104336" comment="libmsrpc-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104337" comment="libmsrpc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104338" comment="libsmbclient-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104339" comment="libsmbclient-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104340" comment="libsmbclient less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104341" comment="samba-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104342" comment="samba-client-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104343" comment="samba-client less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104344" comment="samba-doc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104345" comment="samba-krb-printing less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104346" comment="samba-python less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104347" comment="samba-vscan less than 0.3.6b-42.85.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104348" comment="samba-winbind-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104349" comment="samba-winbind less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104350" comment="samba less than 3.0.32-0.20.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2074</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2074" source="CVE"/>
	<description>
	istream.c in w3m 0.5.2 and possibly other versions, when ssl_verify_server is enabled, does not properly handle a '\0' character in a domain name in the (1) subject's Common Name or (2) Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- d0a18107c31a7195c4751fed877b31e2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061696" comment="w3m-inline-image less than 0.5.1-19.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061695" comment="w3m less than 0.5.1-19.10.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061696" comment="w3m-inline-image less than 0.5.1-19.10.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2077</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2077" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2010-1640.  Reason: This candidate is a duplicate of CVE-2010-1640.  Notes: All CVE users should reference CVE-2010-1640 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 4848aa7c729bd3ea7adc21be1dee8683 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061757" comment="clamav less than 0.96.1-0.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2089</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089" source="CVE"/>
	<description>
	The audioop module in Python 2.7 and 3.2 does not verify the relationships between size arguments and byte string lengths, which allows context-dependent attackers to cause a denial of service (memory corruption and application crash) via crafted arguments, as demonstrated by a call to audioop.reverse with a one-byte string, a different vulnerability than CVE-2010-1634.
	</description>
 </metadata>
<!-- a2098cb2e3d51d63912dc55b837af4c0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065582" comment="python-64bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065585" comment="python-x86 less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2094</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2094" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2094" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in the phar extension in PHP 5.3 before 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the (1) phar_stream_flush, (2) phar_wrapper_unlink, (3) phar_parse_url, or (4) phar_wrapper_open_url functions in ext/phar/stream.c; and the (5) phar_wrapper_open_dir function in ext/phar/dirstream.c, which triggers errors in the php_stream_wrapper_log_error function.
	</description>
 </metadata>
<!-- a465fef49cd0917e6c11e39749442442 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062613" comment="php5-tidy less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2221</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2221" source="CVE"/>
	<description>
	Multiple buffer overflows in the iSNS implementation in isns.c in (1) Linux SCSI target framework (aka tgt or scsi-target-utils) before 1.0.6, (2) iSCSI Enterprise Target (aka iscsitarget or IET) 1.4.20.1 and earlier, and (3) Generic SCSI Target Subsystem for Linux (aka SCST or iscsi-scst) 1.0.1.1 and earlier allow remote attackers to cause a denial of service (memory corruption and daemon crash) or possibly execute arbitrary code via (a) a long iSCSI Name string in an SCN message or (b) an invalid PDU.
	</description>
 </metadata>
<!-- 7816938631e6d4f1a885eea4f161d213 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062620" comment="iscsitarget less than 0.4.17-3.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2225</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2225" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2225" source="CVE"/>
	<description>
	Use-after-free vulnerability in the SplObjectStorage unserializer in PHP 5.2.x and 5.3.x through 5.3.2 allows remote attackers to execute arbitrary code or obtain sensitive information via serialized data, related to the PHP unserialize function.
	</description>
 </metadata>
<!-- a465fef49cd0917e6c11e39749442442 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062583" comment="php5-json less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062564" comment="apache2-mod_php5 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062565" comment="php5-bcmath less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062566" comment="php5-bz2 less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062567" comment="php5-calendar less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062568" comment="php5-ctype less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062569" comment="php5-curl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062570" comment="php5-dba less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062571" comment="php5-dbase less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062572" comment="php5-devel less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062573" comment="php5-dom less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062574" comment="php5-exif less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062575" comment="php5-fastcgi less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062576" comment="php5-ftp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062577" comment="php5-gd less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062578" comment="php5-gettext less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062579" comment="php5-gmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062580" comment="php5-hash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062581" comment="php5-iconv less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062582" comment="php5-imap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062584" comment="php5-ldap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062585" comment="php5-mbstring less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062586" comment="php5-mcrypt less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062587" comment="php5-mhash less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062588" comment="php5-mysql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062589" comment="php5-ncurses less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062590" comment="php5-odbc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062591" comment="php5-openssl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062592" comment="php5-pcntl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062593" comment="php5-pdo less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062594" comment="php5-pear less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062595" comment="php5-pgsql less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062596" comment="php5-posix less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062597" comment="php5-pspell less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062598" comment="php5-shmop less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062599" comment="php5-snmp less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062600" comment="php5-soap less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062601" comment="php5-sockets less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062602" comment="php5-sqlite less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062603" comment="php5-suhosin less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062604" comment="php5-sysvmsg less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062605" comment="php5-sysvsem less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062606" comment="php5-sysvshm less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062613" comment="php5-tidy less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062607" comment="php5-tokenizer less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062608" comment="php5-wddx less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062609" comment="php5-xmlreader less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062610" comment="php5-xmlrpc less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062611" comment="php5-xsl less than 5.2.14-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062612" comment="php5-zlib less than 5.2.14-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2226</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2226" source="CVE"/>
	<description>
	The xfs_swapext function in fs/xfs/xfs_dfrag.c in the Linux kernel before 2.6.35 does not properly check the file descriptors passed to the SWAPEXT ioctl, which allows local users to leverage write access and obtain read access by swapping one file into another file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2227</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2227" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2227" source="CVE"/>
	<description>
	Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."
	</description>
 </metadata>
<!-- 3793d545020770468c203596abe564e1 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009062690" comment="tomcat5-admin-webapps less than 5.5.27-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062691" comment="tomcat5-webapps less than 5.5.27-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009062692" comment="tomcat5 less than 5.5.27-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2240</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2240" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2240" source="CVE"/>
	<description>
	The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1c1d30cf9b3bc83062b6206fa78832a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062208" comment="kernel-bigsmp less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062217" comment="kernel-kdumppae less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062210" comment="kernel-smp less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062218" comment="kernel-vmi less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062219" comment="kernel-vmipae less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062214" comment="kernel-xenpae less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062214" comment="kernel-xenpae less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 230218bf314de48afa7d4578b047bc67 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062210" comment="kernel-smp less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2c8f2e0789edccbbb696f7ac32fd95c2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
		</criteria></criteria>
	<!-- ba31a309e8cde77800f42a751dbf7be3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063288" comment="xorg-x11-Xvnc less than 6.9.0-50.67.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063289" comment="xorg-x11-server less than 6.9.0-50.67.1"/>
		</criteria>
	</criteria>
	<!-- bddd9e0040b1c1791105c69533152077 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
		</criteria>
	</criteria>
	<!-- c9de6e2f58ebeafdd07720916546ed3b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062220" comment="kernel-iseries64 less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062221" comment="kernel-ppc64 less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2242</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2242" source="CVE"/>
	<description>
	Red Hat libvirt 0.2.0 through 0.8.2 creates iptables rules with improper mappings of privileged source ports, which allows guest OS users to bypass intended access restrictions by leveraging IP address and source-port values, as demonstrated by copying and deleting an NFS directory tree.
	</description>
 </metadata>
<!-- 1785c19e5aa936f999b1e248d3a7f8bf -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062739" comment="libvirt-devel less than 0.3.3-18.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062737" comment="libvirt-python less than 0.3.3-18.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062738" comment="libvirt less than 0.3.3-18.18.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062739" comment="libvirt-devel less than 0.3.3-18.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062737" comment="libvirt-python less than 0.3.3-18.18.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2248</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2248" source="CVE"/>
	<description>
	fs/cifs/cifssmb.c in the CIFS implementation in the Linux kernel before 2.6.34-rc4 allows remote attackers to cause a denial of service (panic) via an SMB response packet with an invalid CountHigh value, as demonstrated by a response from an OS/2 server, related to the CIFSSMBWrite and CIFSSMBWrite2 functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2249</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2249" source="CVE"/>
	<description>
	Memory leak in pngrutil.c in libpng before 1.2.44, and 1.4.x before 1.4.3, allows remote attackers to cause a denial of service (memory consumption and application crash) via a PNG image containing malformed Physical Scale (aka sCAL) chunks.
	</description>
 </metadata>
<!-- 37055a3106d59423dce730c76401a58e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062300" comment="libpng-32bit less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062304" comment="libpng-64bit less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062301" comment="libpng-devel-32bit less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062305" comment="libpng-devel-64bit less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062302" comment="libpng-devel less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062306" comment="libpng-x86 less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062303" comment="libpng less than 1.2.8-19.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062300" comment="libpng-32bit less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062301" comment="libpng-devel-32bit less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062302" comment="libpng-devel less than 1.2.8-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062303" comment="libpng less than 1.2.8-19.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2283</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2283" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2283" source="CVE"/>
	<description>
	The SMB dissector in Wireshark 0.99.6 through 1.0.13, and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (NULL pointer dereference) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2284</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2284" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2284" source="CVE"/>
	<description>
	Buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2285</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2285" source="CVE"/>
	<description>
	The SMB PIPE dissector in Wireshark 0.8.20 through 1.0.13 and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (NULL pointer dereference) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2286</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2286" source="CVE"/>
	<description>
	The SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.7 through 1.0.13 and 1.2.0 through 1.2.8 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2287</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2287" source="CVE"/>
	<description>
	Buffer overflow in the SigComp Universal Decompressor Virtual Machine dissector in Wireshark 0.10.8 through 1.0.13 and 1.2.0 through 1.2.8 has unknown impact and remote attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2431</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-2431" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2431" source="CVE"/>
	<description>
	The cupsFileOpen function in CUPS before 1.4.4 allows local users, with lp group membership, to overwrite arbitrary files via a symlink attack on the (1) /var/cache/cups/remote.cache or (2) /var/cache/cups/job.cache file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58f92f1602b118d40cc39ae74d76028f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
		</criteria>
	</criteria>
	<!-- f9598c04d95b42f071c19e519984ca37 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2497" source="CVE"/>
	<description>
	Integer underflow in glyph handling in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2498" source="CVE"/>
	<description>
	The psh_glyph_find_strong_points function in pshinter/pshalgo.c in FreeType before 2.4.0 does not properly implement hinting masks, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly execute arbitrary code via a crafted font file that triggers an invalid free operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2499</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2499" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted LaserWriter PS font file with an embedded PFB fragment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2500" source="CVE"/>
	<description>
	Integer overflow in the gray_render_span function in smooth/ftgrays.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2519</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2519" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted length value in a POST fragment header in a font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2520</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2520" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_IUP function in truetype/ttinterp.c in FreeType before 2.4.0, when TrueType bytecode support is enabled, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2521</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2521" source="CVE"/>
	<description>
	Multiple buffer overflows in fs/nfsd/nfs4xdr.c in the XDR implementation in the NFS server in the Linux kernel before 2.6.34-rc6 allow remote attackers to cause a denial of service (panic) or possibly execute arbitrary code via a crafted NFSv4 compound WRITE request, related to the read_buf and nfsd4_decode_compound functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 1c1d30cf9b3bc83062b6206fa78832a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062208" comment="kernel-bigsmp less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062217" comment="kernel-kdumppae less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062210" comment="kernel-smp less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062218" comment="kernel-vmi less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062219" comment="kernel-vmipae less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062214" comment="kernel-xenpae less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062214" comment="kernel-xenpae less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 230218bf314de48afa7d4578b047bc67 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062210" comment="kernel-smp less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062213" comment="kernel-xen less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2c8f2e0789edccbbb696f7ac32fd95c2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062215" comment="kernel-debug less than 2.6.16.60-0.68.1"/>
		</criteria></criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- bddd9e0040b1c1791105c69533152077 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
		</criteria>
	</criteria>
	<!-- c9de6e2f58ebeafdd07720916546ed3b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062209" comment="kernel-default less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062220" comment="kernel-iseries64 less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062221" comment="kernel-ppc64 less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062211" comment="kernel-source less than 2.6.16.60-0.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062212" comment="kernel-syms less than 2.6.16.60-0.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062216" comment="kernel-kdump less than 2.6.16.60-0.68.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2527</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2527" source="CVE"/>
	<description>
	Multiple buffer overflows in demo programs in FreeType before 2.4.0 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2541" source="CVE"/>
	<description>
	Buffer overflow in ftmulti.c in the ftmulti demo program in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2547" source="CVE"/>
	<description>
	Use-after-free vulnerability in kbx/keybox-blob.c in GPGSM in GnuPG 2.x through 2.0.16 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a certificate with a large number of Subject Alternate Names, which is not properly handled in a realloc operation when importing the certificate or verifying its signature.
	</description>
 </metadata>
<!-- 43be6b4ccd31b0dd00d0838b3b5792f3 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009061960" comment="gpg2 less than 1.9.18-17.21.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2640</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2640" source="CVE"/>
	<description>
	Array index error in the PK font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
<!-- 18eb91dcadeb46f14626af7001412509 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070745" comment="evince less than 0.4.0-25.13.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2641</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2641" source="CVE"/>
	<description>
	Array index error in the VF font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
<!-- 18eb91dcadeb46f14626af7001412509 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070745" comment="evince less than 0.4.0-25.13.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102642" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2642</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2642" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2642" source="CVE"/>
	<description>
	Heap-based buffer overflow in the AFM font parser in the dvi-backend component in Evince 2.32 and earlier, teTeX 3.0, t1lib 5.1.2, and possibly other products allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
<!-- 18eb91dcadeb46f14626af7001412509 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070745" comment="evince less than 0.4.0-25.13.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2643</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2643" source="CVE"/>
	<description>
	Integer overflow in the TFM font parser in the dvi-backend component in Evince 2.32 and earlier allows remote attackers to execute arbitrary code via a crafted font in conjunction with a DVI file that is processed by the thumbnailer.
	</description>
 </metadata>
<!-- 18eb91dcadeb46f14626af7001412509 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009070745" comment="evince less than 0.4.0-25.13.4"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2751</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2751" source="CVE"/>
	<description>
	The nsDocShell::OnRedirectStateChange function in docshell/base/nsDocShell.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, and SeaMonkey before 2.0.6, allows remote attackers to spoof the SSL security status of a document via vectors involving multiple requests, a redirect, and the history.back and history.forward JavaScript functions.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2752</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2752" source="CVE"/>
	<description>
	Integer overflow in an array class in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code by placing many Cascading Style Sheets (CSS) values in an array, related to references to external font resources and an inconsistency between 16-bit and 32-bit integers.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2753</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2753" source="CVE"/>
	<description>
	Integer overflow in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 allows remote attackers to execute arbitrary code via a large selection attribute in a XUL tree element, which triggers a use-after-free.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ae6e95010633fc3aaeda46196d97e650 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2754</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2754" source="CVE"/>
	<description>
	dom/base/nsJSEnvironment.cpp in Mozilla Firefox 3.5.x before 3.5.11 and 3.6.x before 3.6.7, Thunderbird 3.0.x before 3.0.6 and 3.1.x before 3.1.1, and SeaMonkey before 2.0.6 does not properly suppress a script's URL in certain circumstances involving a redirect and an error message, which allows remote attackers to obtain sensitive information about script parameters via a crafted HTML document, related to the window.onerror handler.
	</description>
 </metadata>
<!-- 8b35218d04ea0b2f8a4fa600f61c669c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061842" comment="MozillaFirefox-translations less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061843" comment="MozillaFirefox less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061844" comment="mozilla-xulrunner191-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061845" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061846" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061847" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061848" comment="mozilla-xulrunner191-translations less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061849" comment="mozilla-xulrunner191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009061850" comment="MozillaFirefox-branding-upstream less than 3.5.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061851" comment="mozilla-xulrunner191-devel less than 1.9.1.11-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009061852" comment="python-xpcom191 less than 1.9.1.11-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2760</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2760" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTreeSelection function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via vectors involving a XUL tree selection, related to a "dangling pointer vulnerability." NOTE: this issue exists because of an incomplete fix for CVE-2010-2753.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2761</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2761" source="CVE"/>
	<description>
	The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME boundary string in multipart/x-mixed-replace content, which allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input that contains this value, a different vulnerability than CVE-2010-3172.
	</description>
 </metadata>
<!-- aa08850f4b8bd72b4cd28674c6bdf3d6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065608" comment="perl-64bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065609" comment="perl-x86 less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2762</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2762" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox 3.6.x before 3.6.9 and Thunderbird 3.1.x before 3.1.3 does not properly restrict objects at the end of scope chains, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to a chrome privileged object and a chain ending in an outer object.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2763</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2763" source="CVE"/>
	<description>
	The XPCSafeJSObjectWrapper class in the SafeJSObjectWrapper (aka SJOW) implementation in Mozilla Firefox before 3.5.12, Thunderbird before 3.0.7, and SeaMonkey before 2.0.7 does not properly restrict scripted functions, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted function.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2764</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2764" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict read access to the statusText property of XMLHttpRequest objects, which allows remote attackers to discover the existence of intranet web servers via cross-origin requests.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2765</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2765" source="CVE"/>
	<description>
	Integer overflow in the FRAMESET element implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a large number of values in the cols (aka columns) attribute, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2766</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2766" source="CVE"/>
	<description>
	The normalizeDocument function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle the removal of DOM nodes during normalization, which might allow remote attackers to execute arbitrary code via vectors involving access to a deleted object.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2767</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2767" source="CVE"/>
	<description>
	The navigator.plugins implementation in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle destruction of the DOM plugin array, which might allow remote attackers to cause a denial of service (application crash) or execute arbitrary code via crafted access to the navigator object, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2768</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2768" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict use of the type attribute of an OBJECT element to set a document's charset, which allows remote attackers to bypass cross-site scripting (XSS) protection mechanisms via UTF-7 encoding.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2769</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2769" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allows user-assisted remote attackers to inject arbitrary web script or HTML via a selection that is added to a document in which the designMode property is enabled.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2770</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2770" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Mac OS X allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted font in a data: URL.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2799</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2799" source="CVE"/>
	<description>
	Stack-based buffer overflow in the nestlex function in nestlex.c in Socat 1.5.0.0 through 1.7.1.2 and 2.0.0-b1 through 2.0.0-b3, when bidirectional data relay is enabled, allows context-dependent attackers to execute arbitrary code via long command-line arguments.
	</description>
 </metadata>
<!-- 26d6956b5e38b37b8fb00575dde970ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074797" comment="socat less than 1.7.0.0-1.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2805</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2805" source="CVE"/>
	<description>
	The FT_Stream_EnterFrame function in base/ftstream.c in FreeType before 2.4.2 does not properly validate certain position values, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f5e12625ac6384954079609270ebf9e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2806</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2806" source="CVE"/>
	<description>
	Array index error in the t42_parse_sfnts function in type42/t42parse.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via negative size values for certain strings in FontType42 font files, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 0f5e12625ac6384954079609270ebf9e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2807</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2807" source="CVE"/>
	<description>
	FreeType before 2.4.2 uses incorrect integer data types during bounds checking, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
<!-- 0f5e12625ac6384954079609270ebf9e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2808</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2808" source="CVE"/>
	<description>
	Buffer overflow in the Mac_Read_POST_Resource function in base/ftobjs.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Adobe Type 1 Mac Font File (aka LWFN) font.
	</description>
 </metadata>
<!-- 0f5e12625ac6384954079609270ebf9e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062158" comment="freetype2-64bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062159" comment="freetype2-devel-64bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062160" comment="freetype2-x86 less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009062154" comment="freetype2-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062155" comment="freetype2-devel-32bit less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062156" comment="freetype2-devel less than 2.1.10-18.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009062157" comment="freetype2 less than 2.1.10-18.22.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2891</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2891" source="CVE"/>
	<description>
	Buffer overflow in the smiGetNode function in lib/smi.c in libsmi 0.4.8 allows context-dependent attackers to execute arbitrary code via an Object Identifier (aka OID) represented as a numerical string containing many components separated by . (dot) characters.
	</description>
 </metadata>
<!-- fe395493f61d13965cb472aa904c9104 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065587" comment="libsmi-devel less than 0.4.3-17.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065588" comment="libsmi less than 0.4.3-17.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2935</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2935" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2935" source="CVE"/>
	<description>
	simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle integer values associated with dictionary property items, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PowerPoint document that triggers a heap-based buffer overflow, related to an "integer truncation error."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20a43a6236ae3ea36fc8d8e3dabff428 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063585" comment="OpenOffice_org-cs less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063587" comment="OpenOffice_org-de less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063590" comment="OpenOffice_org-es less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063592" comment="OpenOffice_org-fr less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063593" comment="OpenOffice_org-galleries less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063594" comment="OpenOffice_org-gnome less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063597" comment="OpenOffice_org-hu less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063598" comment="OpenOffice_org-it less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063599" comment="OpenOffice_org-ja less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063600" comment="OpenOffice_org-kde less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063602" comment="OpenOffice_org-mono less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063607" comment="OpenOffice_org-pl less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063608" comment="OpenOffice_org-pt-BR less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063610" comment="OpenOffice_org-sk less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063613" comment="OpenOffice_org-zh-CN less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063614" comment="OpenOffice_org-zh-TW less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063616" comment="OpenOffice_org less than 3.2.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 620ba2655e733f37c547ce340f0bdce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2936</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2936" source="CVE"/>
	<description>
	Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 20a43a6236ae3ea36fc8d8e3dabff428 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063585" comment="OpenOffice_org-cs less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063587" comment="OpenOffice_org-de less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063590" comment="OpenOffice_org-es less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063592" comment="OpenOffice_org-fr less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063593" comment="OpenOffice_org-galleries less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063594" comment="OpenOffice_org-gnome less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063597" comment="OpenOffice_org-hu less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063598" comment="OpenOffice_org-it less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063599" comment="OpenOffice_org-ja less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063600" comment="OpenOffice_org-kde less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063602" comment="OpenOffice_org-mono less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063607" comment="OpenOffice_org-pl less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063608" comment="OpenOffice_org-pt-BR less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063610" comment="OpenOffice_org-sk less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063613" comment="OpenOffice_org-zh-CN less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063614" comment="OpenOffice_org-zh-TW less than 3.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063616" comment="OpenOffice_org less than 3.2.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 620ba2655e733f37c547ce340f0bdce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2939</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2939" source="CVE"/>
	<description>
	Double free vulnerability in the ssl3_get_key_exchange function in the OpenSSL client (ssl/s3_clnt.c) in OpenSSL 1.0.0a, 0.9.8, 0.9.7, and possibly other versions, when using ECDH, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted private key with an invalid prime.  NOTE: some sources refer to this as a use-after-free issue.
	</description>
 </metadata>
<!-- 9402e64690b1a9a7f760ca687f37f7aa -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064327" comment="openssl-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064331" comment="openssl-64bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064328" comment="openssl-devel-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064332" comment="openssl-devel-64bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064329" comment="openssl-devel less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064333" comment="openssl-doc less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064334" comment="openssl-x86 less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064330" comment="openssl less than 0.9.8a-18.43.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064327" comment="openssl-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064328" comment="openssl-devel-32bit less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064329" comment="openssl-devel less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064333" comment="openssl-doc less than 0.9.8a-18.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064330" comment="openssl less than 0.9.8a-18.43.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064333" comment="openssl-doc less than 0.9.8a-18.43.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2942</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2942" source="CVE"/>
	<description>
	The actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc2 does not properly initialize certain structure members when performing dump operations, which allows local users to obtain potentially sensitive information from kernel memory via vectors related to (1) the tcf_gact_dump function in net/sched/act_gact.c, (2) the tcf_mirred_dump function in net/sched/act_mirred.c, (3) the tcf_nat_dump function in net/sched/act_nat.c, (4) the tcf_simp_dump function in net/sched/act_simple.c, and (5) the tcf_skbedit_dump function in net/sched/act_skbedit.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2946</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2946" source="CVE"/>
	<description>
	fs/jfs/xattr.c in the Linux kernel before 2.6.35.2 does not properly handle a certain legacy format for storage of extended attributes, which might allow local users by bypass intended xattr namespace restrictions via an "os2." substring at the beginning of a name.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2948</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2948" source="CVE"/>
	<description>
	Stack-based buffer overflow in the bgp_route_refresh_receive function in bgp_packet.c in bgpd in Quagga before 0.99.17 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a malformed Outbound Route Filtering (ORF) record in a BGP ROUTE-REFRESH (RR) message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12720fe34fa1f6df34c77ec7a3683b77 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064515" comment="quagga-devel less than 0.99.9-14.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064516" comment="quagga less than 0.99.9-14.7.1"/>
		</criteria>
	</criteria>
	<!-- 337640d5ca3a5bedf245344775781a8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067087" comment="quagga-devel less than 0.99.9-14.9.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067088" comment="quagga less than 0.99.9-14.9.3"/>
		</criteria>
	</criteria>
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- 7b7402a5f105f244235ede2bf7547a64 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066709" comment="quagga-devel less than 0.99.9-14.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066710" comment="quagga less than 0.99.9-14.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2949</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2949" source="CVE"/>
	<description>
	bgpd in Quagga before 0.99.17 does not properly parse AS paths, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unknown AS type in an AS path attribute in a BGP UPDATE message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12720fe34fa1f6df34c77ec7a3683b77 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064515" comment="quagga-devel less than 0.99.9-14.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064516" comment="quagga less than 0.99.9-14.7.1"/>
		</criteria>
	</criteria>
	<!-- 337640d5ca3a5bedf245344775781a8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067087" comment="quagga-devel less than 0.99.9-14.9.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067088" comment="quagga less than 0.99.9-14.9.3"/>
		</criteria>
	</criteria>
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- 7b7402a5f105f244235ede2bf7547a64 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066709" comment="quagga-devel less than 0.99.9-14.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066710" comment="quagga less than 0.99.9-14.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2955</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2955" source="CVE"/>
	<description>
	The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1d8b621f48289c999d25f9370517eff7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063021" comment="kernel-iseries64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063023" comment="kernel-ppc64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 2145dc686948891d0125c2ad5f235b76 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 9fc4a77a3b1564fa574d7a17f33c0a82 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063034" comment="lirc-kmp-default less than 0.8.0_2.6.16.60_0.69.1-0.12.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b1e006fd7d91b808f69f71171dedecd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d66f802cf2fe007b89049126e4774cb3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063037" comment="kernel-bigsmp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063039" comment="kernel-kdumppae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063040" comment="kernel-vmi less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063041" comment="kernel-vmipae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2992</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2992" source="CVE"/>
	<description>
	packet-gsm_a_rr.c in the GSM A RR dissector in Wireshark 1.2.2 through 1.2.9 allows remote attackers to cause a denial of service (crash) via unknown vectors that trigger a NULL pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2993</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2993" source="CVE"/>
	<description>
	The IPMI dissector in Wireshark 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (infinite loop) via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2994</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2994" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ASN.1 BER dissector in Wireshark 0.10.13 through 1.0.14 and 1.2.0 through 1.2.9 has unknown impact and remote attack vectors.  NOTE: this issue exists because of a CVE-2010-2284 regression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20102995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-2995</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2995" source="CVE"/>
	<description>
	The SigComp Universal Decompressor Virtual Machine (UDVM) in Wireshark 0.10.8 through 1.0.14 and 1.2.0 through 1.2.9 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors related to sigcomp-udvm.c and an off-by-one error, which triggers a buffer overflow, different vulnerabilities than CVE-2010-2287.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3053</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3053" source="CVE"/>
	<description>
	bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- c5e42e1428c24098b25949e9b361ea93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063379" comment="freetype2-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063383" comment="freetype2-64bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063380" comment="freetype2-devel-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063384" comment="freetype2-devel-64bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063381" comment="freetype2-devel less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063385" comment="freetype2-x86 less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063382" comment="freetype2 less than 2.1.10-18.23.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063379" comment="freetype2-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063380" comment="freetype2-devel-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063381" comment="freetype2-devel less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063382" comment="freetype2 less than 2.1.10-18.23.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3054</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3054" source="CVE"/>
	<description>
	Unspecified vulnerability in FreeType 2.3.9, and other versions before 2.4.2, allows remote attackers to cause a denial of service via vectors involving nested Standard Encoding Accented Character (aka seac) calls, related to psaux.h, cffgload.c, cffgload.h, and t1decode.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- c5e42e1428c24098b25949e9b361ea93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063379" comment="freetype2-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063383" comment="freetype2-64bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063380" comment="freetype2-devel-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063384" comment="freetype2-devel-64bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063381" comment="freetype2-devel less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063385" comment="freetype2-x86 less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063382" comment="freetype2 less than 2.1.10-18.23.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063379" comment="freetype2-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063380" comment="freetype2-devel-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063381" comment="freetype2-devel less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063382" comment="freetype2 less than 2.1.10-18.23.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3067</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3067" source="CVE"/>
	<description>
	Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3069</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3069" source="CVE"/>
	<description>
	Stack-based buffer overflow in the (1) sid_parse and (2) dom_sid_parse functions in Samba before 3.5.5 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted Windows Security ID (SID) on a file share.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 264c86fa1307ebb3a47108bc872729cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063158" comment="cifs-mount less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063159" comment="ldapsmb less than 1.34b-25.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063171" comment="libmsrpc-devel less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063172" comment="libmsrpc less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063160" comment="libsmbclient-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063173" comment="libsmbclient-64bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063161" comment="libsmbclient-devel less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063174" comment="libsmbclient-x86 less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063162" comment="libsmbclient less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063163" comment="samba-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063175" comment="samba-64bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063164" comment="samba-client-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063176" comment="samba-client-64bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063177" comment="samba-client-x86 less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063165" comment="samba-client less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063166" comment="samba-krb-printing less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063178" comment="samba-python less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063167" comment="samba-vscan less than 0.3.6b-43.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063168" comment="samba-winbind-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063179" comment="samba-winbind-64bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063180" comment="samba-winbind-x86 less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063169" comment="samba-winbind less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063181" comment="samba-x86 less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063170" comment="samba less than 3.0.36-0.13.12.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063158" comment="cifs-mount less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063159" comment="ldapsmb less than 1.34b-25.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063171" comment="libmsrpc-devel less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063172" comment="libmsrpc less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063160" comment="libsmbclient-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063161" comment="libsmbclient-devel less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063162" comment="libsmbclient less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063163" comment="samba-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063164" comment="samba-client-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063165" comment="samba-client less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063166" comment="samba-krb-printing less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063178" comment="samba-python less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063167" comment="samba-vscan less than 0.3.6b-43.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063168" comment="samba-winbind-32bit less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063169" comment="samba-winbind less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063170" comment="samba less than 3.0.36-0.13.12.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063171" comment="libmsrpc-devel less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063172" comment="libmsrpc less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063161" comment="libsmbclient-devel less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063182" comment="libsmbsharemodes-devel less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063183" comment="libsmbsharemodes less than 3.0.36-0.13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063178" comment="samba-python less than 3.0.36-0.13.12.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7647f10c23183441620c089dfae68cd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104335" comment="cifs-mount less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104336" comment="libmsrpc-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104337" comment="libmsrpc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104338" comment="libsmbclient-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104339" comment="libsmbclient-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104340" comment="libsmbclient less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104341" comment="samba-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104342" comment="samba-client-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104343" comment="samba-client less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104344" comment="samba-doc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104345" comment="samba-krb-printing less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104346" comment="samba-python less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104347" comment="samba-vscan less than 0.3.6b-42.85.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104348" comment="samba-winbind-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104349" comment="samba-winbind less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104350" comment="samba less than 3.0.32-0.20.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3078</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3078" source="CVE"/>
	<description>
	The xfs_ioc_fsgetxattr function in fs/xfs/linux-2.6/xfs_ioctl.c in the Linux kernel before 2.6.36-rc4 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1d8b621f48289c999d25f9370517eff7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063021" comment="kernel-iseries64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063023" comment="kernel-ppc64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 2145dc686948891d0125c2ad5f235b76 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 9fc4a77a3b1564fa574d7a17f33c0a82 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063034" comment="lirc-kmp-default less than 0.8.0_2.6.16.60_0.69.1-0.12.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b1e006fd7d91b808f69f71171dedecd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d66f802cf2fe007b89049126e4774cb3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063037" comment="kernel-bigsmp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063039" comment="kernel-kdumppae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063040" comment="kernel-vmi less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063041" comment="kernel-vmipae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3081</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3081" source="CVE"/>
	<description>
	The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 17711b37b9377f599635ebd22c5f3779 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063222" comment="ib-bonding-kmp-default less than 0.9.0_2.6.16.60_0.69.5-1.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063223" comment="oracleasm-kmp-default less than 2.0.5_2.6.16.60_0.69.5-7.5.2"/>
		</criteria>
	</criteria>
	<!-- 1d8b621f48289c999d25f9370517eff7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063021" comment="kernel-iseries64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063023" comment="kernel-ppc64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 2145dc686948891d0125c2ad5f235b76 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 9fc4a77a3b1564fa574d7a17f33c0a82 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063034" comment="lirc-kmp-default less than 0.8.0_2.6.16.60_0.69.1-0.12.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b1e006fd7d91b808f69f71171dedecd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d66f802cf2fe007b89049126e4774cb3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063037" comment="kernel-bigsmp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063039" comment="kernel-kdumppae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063040" comment="kernel-vmi less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063041" comment="kernel-vmipae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3086</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3086" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3086" source="CVE"/>
	<description>
	include/asm-x86/futex.h in the Linux kernel before 2.6.25 does not properly implement exception fixup, which allows local users to cause a denial of service (panic) via an invalid application that triggers a page fault.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3089</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3089" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in GNU Mailman before 2.1.14rc1 allow remote authenticated users to inject arbitrary web script or HTML via vectors involving (1) the list information field or (2) the list description field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01644f2af5cc2b20948d5777c1357c11 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068072" comment="mailman less than 2.1.7-15.8.1"/>
	</criteria>
	<!-- 9b0d6e7271e6e44245599a142886e7bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068072" comment="mailman less than 2.1.7-15.8.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3131</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3131" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 on Windows XP allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a .htm, .html, .jtx, .mfp, or .eml file.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3166</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3166" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsTextFrameUtils::TransformText function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 might allow remote attackers to execute arbitrary code via a bidirectional text run.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3167</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3167" source="CVE"/>
	<description>
	The nsTreeContentView function in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 does not properly handle node removal in XUL trees, which allows remote attackers to execute arbitrary code via vectors involving access to deleted memory, related to a "dangling pointer vulnerability."
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3168</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3168" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3168" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 do not properly restrict the role of property changes in triggering XUL tree removal, which allows remote attackers to cause a denial of service (deleted memory access and application crash) or possibly execute arbitrary code by setting unspecified properties.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3169</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3169" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.12 and 3.6.x before 3.6.9, Thunderbird before 3.0.7 and 3.1.x before 3.1.3, and SeaMonkey before 2.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3170" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7ae00681519411e94c06aee5c9b407ab -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064199" comment="mozilla-nspr-32bit less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064206" comment="mozilla-nspr-64bit less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064200" comment="mozilla-nspr-devel less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064207" comment="mozilla-nspr-x86 less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064201" comment="mozilla-nspr less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064202" comment="mozilla-nss-32bit less than 3.12.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064208" comment="mozilla-nss-64bit less than 3.12.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064203" comment="mozilla-nss-devel less than 3.12.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064209" comment="mozilla-nss-x86 less than 3.12.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064205" comment="mozilla-nss less than 3.12.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064199" comment="mozilla-nspr-32bit less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064200" comment="mozilla-nspr-devel less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064201" comment="mozilla-nspr less than 4.8.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064202" comment="mozilla-nss-32bit less than 3.12.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064203" comment="mozilla-nss-devel less than 3.12.8-1.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064205" comment="mozilla-nss less than 3.12.8-1.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064204" comment="mozilla-nss-tools less than 3.12.8-1.4.1"/>
		</criteria></criteria>
	<!-- ae6e95010633fc3aaeda46196d97e650 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3172</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3172" source="CVE"/>
	<description>
	CRLF injection vulnerability in Bugzilla before 3.2.9, 3.4.x before 3.4.9, 3.6.x before 3.6.3, and 4.0.x before 4.0rc1, when Server Push is enabled in a web browser, allows remote attackers to inject arbitrary HTTP headers and content, and conduct HTTP response splitting attacks, via a crafted URL.
	</description>
 </metadata>
<!-- aa08850f4b8bd72b4cd28674c6bdf3d6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065608" comment="perl-64bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065609" comment="perl-x86 less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3173</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3173" source="CVE"/>
	<description>
	The SSL implementation in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly set the minimum key length for Diffie-Hellman Ephemeral (DHE) mode, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
	</description>
 </metadata>
<!-- 7ae00681519411e94c06aee5c9b407ab -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064199" comment="mozilla-nspr-32bit less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064206" comment="mozilla-nspr-64bit less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064200" comment="mozilla-nspr-devel less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064207" comment="mozilla-nspr-x86 less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064201" comment="mozilla-nspr less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064202" comment="mozilla-nss-32bit less than 3.12.8-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064208" comment="mozilla-nss-64bit less than 3.12.8-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064203" comment="mozilla-nss-devel less than 3.12.8-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064209" comment="mozilla-nss-x86 less than 3.12.8-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064205" comment="mozilla-nss less than 3.12.8-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064199" comment="mozilla-nspr-32bit less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064200" comment="mozilla-nspr-devel less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064201" comment="mozilla-nspr less than 4.8.6-1.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064202" comment="mozilla-nss-32bit less than 3.12.8-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064203" comment="mozilla-nss-devel less than 3.12.8-1.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064205" comment="mozilla-nss less than 3.12.8-1.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064204" comment="mozilla-nss-tools less than 3.12.8-1.4.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3174" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.14, Thunderbird before 3.0.9, and SeaMonkey before 2.0.9 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3175" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.11 and Thunderbird 3.1.x before 3.1.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3176" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3177" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the Gopher parser in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, and SeaMonkey before 2.0.9, allow remote attackers to inject arbitrary web script or HTML via a crafted name of a (1) file or (2) directory on a Gopher server.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3178</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3178" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 do not properly handle certain modal calls made by javascript: URLs in circumstances related to opening a new window and performing cross-domain navigation, which allows remote attackers to bypass the Same Origin Policy via a crafted HTML document.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3179</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3179" source="CVE"/>
	<description>
	Stack-based buffer overflow in the text-rendering functionality in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a long argument to the document.write method.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3180</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3180" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsBarProp function in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 allows remote attackers to execute arbitrary code by accessing the locationbar property of a closed window.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3182" source="CVE"/>
	<description>
	A certain application-launch script in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 on Linux places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3183" source="CVE"/>
	<description>
	The LookupGetterOrSetter function in js3250.dll in Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 does not properly support window.__lookupGetter__ function calls that lack arguments, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect pointer dereference and application crash) via vectors involving a "dangling pointer" and the JS_ValueToId function.
	</description>
 </metadata>
<!-- ae6e95010633fc3aaeda46196d97e650 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064188" comment="MozillaFirefox-translations less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064189" comment="MozillaFirefox less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064190" comment="mozilla-xulrunner191-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064191" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064192" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064193" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064194" comment="mozilla-xulrunner191-translations less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064195" comment="mozilla-xulrunner191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064196" comment="MozillaFirefox-branding-upstream less than 3.5.15-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064197" comment="mozilla-xulrunner191-devel less than 1.9.1.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064198" comment="python-xpcom191 less than 1.9.1.15-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3297</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3297" source="CVE"/>
	<description>
	The eql_g_master_cfg function in drivers/net/eql.c in the Linux kernel before 2.6.36-rc5 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an EQL_GETMASTRCFG ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1d8b621f48289c999d25f9370517eff7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063021" comment="kernel-iseries64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063023" comment="kernel-ppc64 less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 2145dc686948891d0125c2ad5f235b76 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
		</criteria></criteria>
	<!-- 9fc4a77a3b1564fa574d7a17f33c0a82 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063031" comment="cloop-kmp-default less than 2.01_2.6.16.60_0.69.1-22.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063032" comment="cpint-kmp-default less than 2.5.3_2.6.16.60_0.69.1-3.17.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063033" comment="drbd-kmp-default less than 0.7.22_2.6.16.60_0.69.1-42.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063034" comment="lirc-kmp-default less than 0.8.0_2.6.16.60_0.69.1-0.12.1"/>
			</criteria>
		</criteria></criteria>
	<!-- b1e006fd7d91b808f69f71171dedecd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d66f802cf2fe007b89049126e4774cb3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063037" comment="kernel-bigsmp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063020" comment="kernel-default less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063039" comment="kernel-kdumppae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063035" comment="kernel-smp less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063024" comment="kernel-source less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063025" comment="kernel-syms less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063040" comment="kernel-vmi less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063041" comment="kernel-vmipae less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063026" comment="kernel-debug less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063022" comment="kernel-kdump less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063036" comment="kernel-xen less than 2.6.16.60-0.69.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063038" comment="kernel-xenpae less than 2.6.16.60-0.69.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3301</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3301" source="CVE"/>
	<description>
	The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register.  NOTE: this vulnerability exists because of a CVE-2007-4573 regression.
	</description>
 </metadata>
<!-- 17711b37b9377f599635ebd22c5f3779 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009063222" comment="ib-bonding-kmp-default less than 0.9.0_2.6.16.60_0.69.5-1.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009063223" comment="oracleasm-kmp-default less than 2.0.5_2.6.16.60_0.69.5-7.5.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3310</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3310" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3310" source="CVE"/>
	<description>
	Multiple integer signedness errors in net/rose/af_rose.c in the Linux kernel before 2.6.36-rc5-next-20100923 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a rose_getname function call, related to the rose_bind and rose_connect functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3311</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3311" source="CVE"/>
	<description>
	Integer overflow in base/ftstream.c in libXft (aka the X FreeType library) in FreeType before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Compact Font Format (CFF) font file that triggers a heap-based buffer overflow, related to an "input stream position error" issue, a different vulnerability than CVE-2010-1797.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- c5e42e1428c24098b25949e9b361ea93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063379" comment="freetype2-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063383" comment="freetype2-64bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063380" comment="freetype2-devel-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063384" comment="freetype2-devel-64bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063381" comment="freetype2-devel less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063385" comment="freetype2-x86 less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063382" comment="freetype2 less than 2.1.10-18.23.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009063379" comment="freetype2-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063380" comment="freetype2-devel-32bit less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063381" comment="freetype2-devel less than 2.1.10-18.23.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009063382" comment="freetype2 less than 2.1.10-18.23.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3316</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3316" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3316" source="CVE"/>
	<description>
	The run_coprocess function in pam_xauth.c in the pam_xauth module in Linux-PAM (aka pam) before 1.1.2 does not check the return values of the setuid, setgid, and setgroups system calls, which might allow local users to read arbitrary files by executing a program that relies on the pam_xauth PAM check.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ba74f77a051fc5825c4e8658b8fadde6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071652" comment="pam-32bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071655" comment="pam-64bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071656" comment="pam-devel-32bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071657" comment="pam-devel-64bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071653" comment="pam-devel less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071658" comment="pam-x86 less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071654" comment="pam less than 0.99.6.3-28.25.4"/>
		</criteria>
	</criteria>
	<!-- c3b33b1f77a3515061a441ec5f6b289b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071659" comment="pam-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071660" comment="pam-64bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071661" comment="pam-devel-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071662" comment="pam-devel-64bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071663" comment="pam-devel less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071664" comment="pam-x86 less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071665" comment="pam less than 0.99.6.3-28.20.3.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071659" comment="pam-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071661" comment="pam-devel-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071663" comment="pam-devel less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071665" comment="pam less than 0.99.6.3-28.20.3.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3332</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3332" source="CVE"/>
	<description>
	Microsoft .NET Framework 1.1 SP1, 2.0 SP1 and SP2, 3.5, 3.5 SP1, 3.5.1, and 4.0, as used for ASP.NET in Microsoft Internet Information Services (IIS), provides detailed error codes during decryption attempts, which allows remote attackers to decrypt and modify encrypted View State (aka __VIEWSTATE) form data, and possibly forge cookies or read application files, via a padding oracle attack, aka "ASP.NET Padding Oracle Vulnerability."
	</description>
 </metadata>
<!-- acf3e342c719d9e5ee642a15f5422903 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073285" comment="mono-core-32bit less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073299" comment="mono-core-x86 less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073286" comment="mono-core less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073287" comment="mono-data-firebird less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073288" comment="mono-data-oracle less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073289" comment="mono-data-postgresql less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073290" comment="mono-data-sqlite less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073291" comment="mono-data-sybase less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073292" comment="mono-data less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073295" comment="mono-locale-extras less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073296" comment="mono-nunit less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073297" comment="mono-web less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073298" comment="mono-winforms less than 1.2.2-12.32.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073283" comment="bytefx-data-mysql less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073284" comment="ibm-data-db2 less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073285" comment="mono-core-32bit less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073299" comment="mono-core-x86 less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073286" comment="mono-core less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073287" comment="mono-data-firebird less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073288" comment="mono-data-oracle less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073289" comment="mono-data-postgresql less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073290" comment="mono-data-sqlite less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073291" comment="mono-data-sybase less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073292" comment="mono-data less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073293" comment="mono-devel less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073294" comment="mono-extras less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073300" comment="mono-jscript less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073295" comment="mono-locale-extras less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073296" comment="mono-nunit less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073297" comment="mono-web less than 1.2.2-12.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073298" comment="mono-winforms less than 1.2.2-12.32.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3433</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3433" source="CVE"/>
	<description>
	The PL/perl and PL/Tcl implementations in PostgreSQL 7.4 before 7.4.30, 8.0 before 8.0.26, 8.1 before 8.1.22, 8.2 before 8.2.18, 8.3 before 8.3.12, 8.4 before 8.4.5, and 9.0 before 9.0.1 do not properly protect script execution by a different SQL user identity within the same session, which allows remote authenticated users to gain privileges via crafted script code in a SECURITY DEFINER function, as demonstrated by (1) redefining standard functions or (2) redefining operators, a different vulnerability than CVE-2010-1168, CVE-2010-1169, CVE-2010-1170, and CVE-2010-1447.
	</description>
 </metadata>
<!-- 86b2fde0e104de1a0641c015efc6c9cc -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063807" comment="postgresql-contrib less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063804" comment="postgresql-devel less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063808" comment="postgresql-docs less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063805" comment="postgresql-libs-32bit less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063809" comment="postgresql-libs-64bit less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063810" comment="postgresql-libs-x86 less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063806" comment="postgresql-libs less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063811" comment="postgresql-pl less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063812" comment="postgresql-server less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063813" comment="postgresql less than 8.1.22-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063807" comment="postgresql-contrib less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063804" comment="postgresql-devel less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063808" comment="postgresql-docs less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063805" comment="postgresql-libs-32bit less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063806" comment="postgresql-libs less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063811" comment="postgresql-pl less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063812" comment="postgresql-server less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063813" comment="postgresql less than 8.1.22-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063807" comment="postgresql-contrib less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063804" comment="postgresql-devel less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063808" comment="postgresql-docs less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063811" comment="postgresql-pl less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063812" comment="postgresql-server less than 8.1.22-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063813" comment="postgresql less than 8.1.22-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3434</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3434" source="CVE"/>
	<description>
	Buffer overflow in the find_stream_bounds function in pdf.c in libclamav in ClamAV before 0.96.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 9602fa7ae6caf7a89457073f091acfb9 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009064568" comment="clamav less than 0.96.4-0.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3437</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3437" source="CVE"/>
	<description>
	Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3442</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3442" source="CVE"/>
	<description>
	Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3445</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3445" source="CVE"/>
	<description>
	Stack consumption vulnerability in the dissect_ber_unknown function in epan/dissectors/packet-ber.c in the BER dissector in Wireshark 1.4.x before 1.4.1 and 1.2.x before 1.2.12 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a long string in an unknown ASN.1/BER encoded packet, as demonstrated using SNMP.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3450</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3450" source="CVE"/>
	<description>
	Multiple directory traversal vulnerabilities in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to overwrite arbitrary files via a .. (dot dot) in an entry in (1) an XSLT JAR filter description file, (2) an Extension (aka OXT) file, or unspecified other (3) JAR or (4) ZIP files.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3451</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3451" source="CVE"/>
	<description>
	Use-after-free vulnerability in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed tables in an RTF document.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3452</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3452" source="CVE"/>
	<description>
	Use-after-free vulnerability in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted tags in an RTF document.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3453</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3453" source="CVE"/>
	<description>
	The WW8ListManager::WW8ListManager function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 does not properly handle an unspecified number of list levels in user-defined list styles in WW8 data in a Microsoft Word document, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .DOC file that triggers an out-of-bounds write.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3454</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3454" source="CVE"/>
	<description>
	Multiple off-by-one errors in the WW8DopTypography::ReadFromMem function in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted typography information in a Microsoft Word .DOC file that triggers an out-of-bounds write.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3493</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493" source="CVE"/>
	<description>
	Multiple race conditions in smtpd.py in the smtpd module in Python 2.6, 2.7, 3.1, and 3.2 alpha allow remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, or the getpeername function having an ENOTCONN error, a related issue to CVE-2010-3492.
	</description>
 </metadata>
<!-- a2098cb2e3d51d63912dc55b837af4c0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065582" comment="python-64bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065585" comment="python-x86 less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065575" comment="python-32bit less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065576" comment="python-curses less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065578" comment="python-gdbm less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065579" comment="python-tk less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065580" comment="python-xml less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065581" comment="python less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065583" comment="python-demo less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065577" comment="python-devel less than 2.4.2-18.32.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065584" comment="python-idle less than 2.4.2-18.32.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3495</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3495" source="CVE"/>
	<description>
	Race condition in ZEO/StorageServer.py in Zope Object Database (ZODB) before 3.10.0 allows remote attackers to cause a denial of service (daemon outage) by establishing and then immediately closing a TCP connection, leading to the accept function having an unexpected return value of None, an unexpected value of None for the address, or an ECONNABORTED, EAGAIN, or EWOULDBLOCK error, a related issue to CVE-2010-3492.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 358ec5070aa679e8d0d7bf5286862140 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065224" comment="zope3 less than 3.1.0-18.12.1"/>
	</criteria>
	<!-- c9242328020d462f622a9f17000e4b13 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065225" comment="zope less than 2.7.8-15.17.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3541" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3548</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or "otherwise-protected internal network names."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3553</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
	<!-- ac2e446384cdeb74511d6cd5eb10eb59 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066388" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066379" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066384" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066385" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3555" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.
	</description>
 </metadata>
<!-- 8d66847a4ae8caca98e746ff78880e0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3556</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3557</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of "behavior and state of certain JDK classes" and "mutable static."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
	<!-- ac2e446384cdeb74511d6cd5eb10eb59 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066388" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066379" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066384" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066385" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3558</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3558" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 8d66847a4ae8caca98e746ff78880e0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3559</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3559" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this involves an incorrect sign extension in the HeadspaceSoundbank.nGetName function, which allows attackers to execute arbitrary code via a crafted BANK record that leads to a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3560" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.
	</description>
 </metadata>
<!-- 8d66847a4ae8caca98e746ff78880e0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3562</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3562" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to "how Web Start retrieves security policies," BasicServiceImpl, and forged policies that bypass sandbox restrictions.
	</description>
 </metadata>
<!-- 8d66847a4ae8caca98e746ff78880e0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3565</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3565" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3565" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3566</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3566" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3567</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3567" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to a calculation error in right-to-left text character counts for the ICU OpenType font rendering implementation, which triggers an out-of-bounds memory access.
	</description>
 </metadata>
<!-- 8d66847a4ae8caca98e746ff78880e0e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3568</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3568" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3569</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3569" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3571</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3571" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
	<!-- ac2e446384cdeb74511d6cd5eb10eb59 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066388" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066379" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066384" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066385" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3572</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3572" source="CVE"/>
	<description>
	Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 55ee08c17099b8355f26bdc0f76be3bb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065190" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065191" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065195" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.6-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065192" comment="java-1_4_2-ibm less than 1.4.2_sr13.6-1.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3573</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3573" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3574</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-3574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3574" source="CVE"/>
	<description>
	Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.  NOTE: the previous information was obtained from the October 2010 CPU.  Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b65ef8ab087bd6b69fba574b61214de -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070731" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070722" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070727" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070728" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070720" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070721" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070724" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070725" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070726" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.2-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070730" comment="java-1_5_0-ibm less than 1.5.0_sr12.2-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8451c9123666d5000536667668ce491d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067766" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067767" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067768" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067769" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.13"/>
		</criteria>
	</criteria>
	<!-- 8d66847a4ae8caca98e746ff78880e0e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065628" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065629" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065630" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065631" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065632" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065633" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065634" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065635" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065636" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065637" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.0-1.4.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065638" comment="java-1_6_0-ibm less than 1.6.0_sr9.0-1.4.6"/>
		</criteria>
	</criteria>
	<!-- c4e94000cf9daf61d2273c8fa5dd22c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066038" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066039" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066040" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066041" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066038" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066041" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3609</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3609" source="CVE"/>
	<description>
	The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- e08ec1ea6584207d6d25917d592ea815 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064548" comment="openslp-32bit less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064551" comment="openslp-64bit less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064549" comment="openslp-devel less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064552" comment="openslp-server less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064553" comment="openslp-x86 less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064550" comment="openslp less than 1.2.0-22.31.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064548" comment="openslp-32bit less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064549" comment="openslp-devel less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064552" comment="openslp-server less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064550" comment="openslp less than 1.2.0-22.31.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064549" comment="openslp-devel less than 1.2.0-22.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064552" comment="openslp-server less than 1.2.0-22.31.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3677</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3677" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a join query that uses a table with a unique SET column.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3678</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3678" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3678" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 allows remote authenticated users to cause a denial of service (crash) via (1) IN or (2) CASE operations with NULL arguments that are explicitly specified or indirectly provided by the WITH ROLLUP modifier.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3681</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3681" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3681" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using the HANDLER interface and performing "alternate reads from two indexes on a table," which triggers an assertion failure.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3682</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3682" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.0 before 5.0.92 allows remote authenticated users to cause a denial of service (mysqld daemon crash) by using EXPLAIN with crafted "SELECT ... UNION ... ORDER BY (SELECT ... WHERE ...)" statements, which triggers a NULL pointer dereference in the Item_singlerow_subselect::store function.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3683</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3683" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3683" source="CVE"/>
	<description>
	Oracle MySQL 5.1 before 5.1.49 and 5.5 before 5.5.5 sends an OK packet when a LOAD DATA INFILE request generates SQL errors, which allows remote authenticated users to cause a denial of service (mysqld daemon crash) via a crafted request.
	</description>
 </metadata>
<!-- 826914f7f97a3f40f0cf58084177340b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009063564" comment="mysql-Max less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063567" comment="mysql-bench less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063559" comment="mysql-client less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063560" comment="mysql-devel less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063561" comment="mysql-shared-32bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063565" comment="mysql-shared-64bit less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063566" comment="mysql-shared-x86 less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063562" comment="mysql-shared less than 5.0.26-12.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009063563" comment="mysql less than 5.0.26-12.29.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3689</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3689" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3689" source="CVE"/>
	<description>
	soffice in OpenOffice.org (OOo) 3.x before 3.3 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3699</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3699" source="CVE"/>
	<description>
	The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8b70aa4d05f245a4b664290a8bf4da13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065639" comment="kernel-bigsmp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065648" comment="kernel-kdumppae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065649" comment="kernel-vmi less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065650" comment="kernel-vmipae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 95d48e84e8843770d7b57f4005cf33bd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070814" comment="kernel-iseries64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070815" comment="kernel-ppc64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- ae1877b162fdb5d16cb3a480414a7ce5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
		</criteria>
	</criteria>
	<!-- c18b1f136ef4e3baf765c9110ee8e8ef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- f715eb6e5d39ac340637af52966bcd6e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3702</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3702" source="CVE"/>
	<description>
	The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 119a425a677ce6074c20048f08d6bb1b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065317" comment="xpdf-tools less than 3.01-21.24.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065318" comment="xpdf less than 3.01-21.24.1"/>
		</criteria></criteria>
	<!-- 620ba2655e733f37c547ce340f0bdce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
			</criteria>
		</criteria></criteria>
	<!-- a1156f03440c35ab9d5e6925edc94791 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064504" comment="poppler-glib less than 0.4.4-19.27.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064505" comment="poppler-qt less than 0.4.4-19.27.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064506" comment="poppler less than 0.4.4-19.27.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064503" comment="poppler-devel less than 0.4.4-19.27.1"/>
		</criteria></criteria>
	<!-- d80f195def5f87d532c424567f8d8cea -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064817" comment="cups-libs-64bit less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064818" comment="cups-libs-x86 less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
			</criteria>
		</criteria></criteria>
	<!-- e3ee5f3465bf28ff10fa73651f8a68a3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064973" comment="kdegraphics3-fax less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064975" comment="kdegraphics3-pdf less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064976" comment="kdegraphics3-postscript less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064978" comment="kdegraphics3 less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064974" comment="kdegraphics3-kamera less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064977" comment="kdegraphics3-scan less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3703</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3703" source="CVE"/>
	<description>
	The PostScriptFunction::PostScriptFunction function in poppler/Function.cc in the PDF parser in poppler 0.8.7 and possibly other versions up to 0.15.1, and possibly other products, allows context-dependent attackers to cause a denial of service (crash) via a PDF file that triggers an uninitialized pointer dereference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 119a425a677ce6074c20048f08d6bb1b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065317" comment="xpdf-tools less than 3.01-21.24.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065318" comment="xpdf less than 3.01-21.24.1"/>
		</criteria></criteria>
	<!-- d80f195def5f87d532c424567f8d8cea -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064817" comment="cups-libs-64bit less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064818" comment="cups-libs-x86 less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064812" comment="cups-client less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064813" comment="cups-devel less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064814" comment="cups-libs-32bit less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064815" comment="cups-libs less than 1.1.23-40.60.12"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064816" comment="cups less than 1.1.23-40.60.12"/>
			</criteria>
		</criteria></criteria>
	<!-- e3ee5f3465bf28ff10fa73651f8a68a3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064973" comment="kdegraphics3-fax less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064975" comment="kdegraphics3-pdf less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064976" comment="kdegraphics3-postscript less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064978" comment="kdegraphics3 less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064974" comment="kdegraphics3-kamera less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064977" comment="kdegraphics3-scan less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3704</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3704" source="CVE"/>
	<description>
	The FoFiType1::parse function in fofi/FoFiType1.cc in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a PDF file with a crafted PostScript Type1 font that contains a negative array index, which bypasses input validation and triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 119a425a677ce6074c20048f08d6bb1b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065317" comment="xpdf-tools less than 3.01-21.24.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065318" comment="xpdf less than 3.01-21.24.1"/>
		</criteria></criteria>
	<!-- 620ba2655e733f37c547ce340f0bdce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e3ee5f3465bf28ff10fa73651f8a68a3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064973" comment="kdegraphics3-fax less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064975" comment="kdegraphics3-pdf less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064976" comment="kdegraphics3-postscript less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064978" comment="kdegraphics3 less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009064972" comment="kdegraphics3-devel less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064979" comment="kdegraphics3-extra less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064974" comment="kdegraphics3-kamera less than 3.5.1-23.30.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009064977" comment="kdegraphics3-scan less than 3.5.1-23.30.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3710</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3710" source="CVE"/>
	<description>
	Stack consumption vulnerability in the filter_var function in PHP 5.2.x through 5.2.14 and 5.3.x through 5.3.3, when FILTER_VALIDATE_EMAIL mode is used, allows remote attackers to cause a denial of service (memory consumption and application crash) via a long e-mail address string.
	</description>
 </metadata>
<!-- f4ae7724bd9c0b013702329c72554501 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064725" comment="apache2-mod_php5 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064726" comment="php5-bcmath less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064727" comment="php5-bz2 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064728" comment="php5-calendar less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064729" comment="php5-ctype less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064730" comment="php5-curl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064731" comment="php5-dba less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064732" comment="php5-dbase less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064733" comment="php5-devel less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064734" comment="php5-dom less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064735" comment="php5-exif less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064736" comment="php5-fastcgi less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064737" comment="php5-ftp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064738" comment="php5-gd less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064739" comment="php5-gettext less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064740" comment="php5-gmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064741" comment="php5-hash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064742" comment="php5-iconv less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064743" comment="php5-imap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064744" comment="php5-json less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064745" comment="php5-ldap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064746" comment="php5-mbstring less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064747" comment="php5-mcrypt less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064748" comment="php5-mhash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064749" comment="php5-mysql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064750" comment="php5-ncurses less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064751" comment="php5-odbc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064752" comment="php5-openssl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064753" comment="php5-pcntl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064754" comment="php5-pdo less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064755" comment="php5-pear less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064756" comment="php5-pgsql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064757" comment="php5-posix less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064758" comment="php5-pspell less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064759" comment="php5-shmop less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064760" comment="php5-snmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064761" comment="php5-soap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064762" comment="php5-sockets less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064763" comment="php5-sqlite less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064764" comment="php5-suhosin less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064765" comment="php5-sysvmsg less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064766" comment="php5-sysvsem less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064767" comment="php5-sysvshm less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064768" comment="php5-tokenizer less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064769" comment="php5-wddx less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064770" comment="php5-xmlreader less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064771" comment="php5-xmlrpc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064772" comment="php5-xsl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064773" comment="php5-zlib less than 5.2.14-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064725" comment="apache2-mod_php5 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064726" comment="php5-bcmath less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064727" comment="php5-bz2 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064728" comment="php5-calendar less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064729" comment="php5-ctype less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064730" comment="php5-curl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064731" comment="php5-dba less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064732" comment="php5-dbase less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064733" comment="php5-devel less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064734" comment="php5-dom less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064735" comment="php5-exif less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064736" comment="php5-fastcgi less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064737" comment="php5-ftp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064738" comment="php5-gd less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064739" comment="php5-gettext less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064740" comment="php5-gmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064742" comment="php5-iconv less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064743" comment="php5-imap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064744" comment="php5-json less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064745" comment="php5-ldap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064746" comment="php5-mbstring less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064747" comment="php5-mcrypt less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064748" comment="php5-mhash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064749" comment="php5-mysql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064750" comment="php5-ncurses less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064751" comment="php5-odbc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064752" comment="php5-openssl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064753" comment="php5-pcntl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064754" comment="php5-pdo less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064755" comment="php5-pear less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064756" comment="php5-pgsql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064757" comment="php5-posix less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064758" comment="php5-pspell less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064759" comment="php5-shmop less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064760" comment="php5-snmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064761" comment="php5-soap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064762" comment="php5-sockets less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064763" comment="php5-sqlite less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064764" comment="php5-suhosin less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064765" comment="php5-sysvmsg less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064766" comment="php5-sysvsem less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064767" comment="php5-sysvshm less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064768" comment="php5-tokenizer less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064769" comment="php5-wddx less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064770" comment="php5-xmlreader less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064771" comment="php5-xmlrpc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064772" comment="php5-xsl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064773" comment="php5-zlib less than 5.2.14-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064725" comment="apache2-mod_php5 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064726" comment="php5-bcmath less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064727" comment="php5-bz2 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064728" comment="php5-calendar less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064729" comment="php5-ctype less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064730" comment="php5-curl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064731" comment="php5-dba less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064732" comment="php5-dbase less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064733" comment="php5-devel less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064734" comment="php5-dom less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064735" comment="php5-exif less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064736" comment="php5-fastcgi less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064737" comment="php5-ftp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064738" comment="php5-gd less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064739" comment="php5-gettext less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064740" comment="php5-gmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064741" comment="php5-hash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064742" comment="php5-iconv less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064743" comment="php5-imap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064745" comment="php5-ldap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064746" comment="php5-mbstring less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064747" comment="php5-mcrypt less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064748" comment="php5-mhash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064749" comment="php5-mysql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064750" comment="php5-ncurses less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064751" comment="php5-odbc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064752" comment="php5-openssl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064753" comment="php5-pcntl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064754" comment="php5-pdo less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064755" comment="php5-pear less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064756" comment="php5-pgsql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064757" comment="php5-posix less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064758" comment="php5-pspell less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064759" comment="php5-shmop less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064760" comment="php5-snmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064761" comment="php5-soap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064762" comment="php5-sockets less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064763" comment="php5-sqlite less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064764" comment="php5-suhosin less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064765" comment="php5-sysvmsg less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064766" comment="php5-sysvsem less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064767" comment="php5-sysvshm less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064774" comment="php5-tidy less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064768" comment="php5-tokenizer less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064769" comment="php5-wddx less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064770" comment="php5-xmlreader less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064771" comment="php5-xmlrpc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064772" comment="php5-xsl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064773" comment="php5-zlib less than 5.2.14-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3711</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3711" source="CVE"/>
	<description>
	libpurple in Pidgin before 2.7.4 does not properly validate the return value of the purple_base64_decode function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a crafted message, related to the plugins for MSN, MySpaceIM, XMPP, and Yahoo! and the NTLM authentication support.
	</description>
 </metadata>
<!-- b2065553568c70babb437af6b08cc06e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071816" comment="finch-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071813" comment="finch less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071817" comment="libpurple-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071814" comment="libpurple less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071818" comment="pidgin-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071815" comment="pidgin less than 2.6.6-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3718</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3718" source="CVE"/>
	<description>
	Apache Tomcat 7.0.0 through 7.0.3, 6.0.x, and 5.5.x, when running within a SecurityManager, does not make the ServletContext attribute read-only, which allows local web applications to read or write files outside of the intended working directory, as demonstrated using a directory traversal attack.
	</description>
 </metadata>
<!-- 83e045a5ff545cd914da5e807340feb0 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065949" comment="tomcat5-admin-webapps less than 5.5.27-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065950" comment="tomcat5-webapps less than 5.5.27-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065951" comment="tomcat5 less than 5.5.27-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3766</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3766" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via vectors involving a change to an nsDOMAttribute node.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3767</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3767" source="CVE"/>
	<description>
	Integer overflow in the NewIdArray function in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allows remote attackers to execute arbitrary code via a JavaScript array with many elements.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3768</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3768" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 do not properly validate downloadable fonts before use within an operating system's font implementation, which allows remote attackers to execute arbitrary code via vectors related to @font-face Cascading Style Sheets (CSS) rules.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3769</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3769" source="CVE"/>
	<description>
	The line-breaking implementation in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 on Windows does not properly handle long strings, which allows remote attackers to execute arbitrary code via a crafted document.write call that triggers a buffer over-read.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3770</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3770" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the rendering engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, allow remote attackers to inject arbitrary web script or HTML via (1) x-mac-arabic, (2) x-mac-farsi, or (3) x-mac-hebrew characters that may be converted to angle brackets during rendering.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3771</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3771" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle injection of an ISINDEX element into an about:blank page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via vectors related to redirection to a chrome: URI.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3772</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3772" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly calculate index values for certain child content in a XUL tree, which allows remote attackers to execute arbitrary code via vectors involving a DIV element within a treechildren element.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3773</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3773" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, when the XMLHttpRequestSpy module in the Firebug add-on is used, does not properly handle interaction between the XMLHttpRequestSpy object and chrome privileged objects, which allows remote attackers to execute arbitrary JavaScript via a crafted HTTP response.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-0179.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3774</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3774" source="CVE"/>
	<description>
	The NS_SecurityCompareURIs function in netwerk/base/public/nsNetUtil.h in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle (1) about:neterror and (2) about:certerror pages, which allows remote attackers to spoof the location bar via a crafted web site.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3775</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3775" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, and SeaMonkey before 2.0.11, does not properly handle certain redirections involving data: URLs and Java LiveConnect scripts, which allows remote attackers to start processes, read arbitrary local files, and establish network connections via vectors involving a refresh value in the http-equiv attribute of a META element, which causes the wrong security principal to be used.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3776</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3776" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3777</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3777" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.6.x before 3.6.13 and Thunderbird 3.1.x before 3.1.7 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 61e0860309635831b6c4f3a30dccd608 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
			</criteria>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3778</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3778" source="CVE"/>
	<description>
	Unspecified vulnerability in Mozilla Firefox 3.5.x before 3.5.16, Thunderbird before 3.0.11, and SeaMonkey before 2.0.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 61e0860309635831b6c4f3a30dccd608 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065407" comment="MozillaFirefox-translations less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065408" comment="MozillaFirefox less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065409" comment="mozilla-xulrunner191-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065410" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065411" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065412" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065413" comment="mozilla-xulrunner191-translations less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065414" comment="mozilla-xulrunner191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065415" comment="MozillaFirefox-branding-upstream less than 3.5.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065416" comment="mozilla-xulrunner191-devel less than 1.9.1.16-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065417" comment="python-xpcom191 less than 1.9.1.16-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3814</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3814" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Ins_SHZ function in ttinterp.c in FreeType 2.4.3 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted SHZ bytecode instruction, related to TrueType opcodes, as demonstrated by a PDF document with a crafted embedded font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 8e613813376cd82ca7e15523f13bfa7e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067752" comment="freetype2-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067756" comment="freetype2-64bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067753" comment="freetype2-devel-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067757" comment="freetype2-devel-64bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067754" comment="freetype2-devel less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067758" comment="freetype2-x86 less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067755" comment="freetype2 less than 2.1.10-18.25.11"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067752" comment="freetype2-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067753" comment="freetype2-devel-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067754" comment="freetype2-devel less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067755" comment="freetype2 less than 2.1.10-18.25.11"/>
			</criteria>
		</criteria></criteria>
	<!-- a4b2ad9796d6e3860ce0ff169310f2cd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067752" comment="freetype2-32bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067756" comment="freetype2-64bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067753" comment="freetype2-devel-32bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067757" comment="freetype2-devel-64bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067754" comment="freetype2-devel less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067758" comment="freetype2-x86 less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067755" comment="freetype2 less than 2.1.10-18.25.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3847</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3847" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3847" source="CVE"/>
	<description>
	elf/dl-load.c in ld.so in the GNU C Library (aka glibc or libc6) through 2.11.2, and 2.12.x through 2.12.1, does not properly handle a value of $ORIGIN for the LD_AUDIT environment variable, which allows local users to gain privileges via a crafted dynamic shared object (DSO) located in an arbitrary directory.
	</description>
 </metadata>
<!-- a7e1bffd1e2cae6bb5c9bbff3d3f9de2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070518" comment="glibc-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070519" comment="glibc-devel-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070520" comment="glibc-locale-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070521" comment="glibc-locale-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070526" comment="glibc-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070527" comment="glibc-dceext-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070528" comment="glibc-dceext-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070529" comment="glibc-dceext-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070530" comment="glibc-dceext less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3848</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3848" source="CVE"/>
	<description>
	Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8b70aa4d05f245a4b664290a8bf4da13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065639" comment="kernel-bigsmp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065648" comment="kernel-kdumppae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065649" comment="kernel-vmi less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065650" comment="kernel-vmipae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 95d48e84e8843770d7b57f4005cf33bd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070814" comment="kernel-iseries64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070815" comment="kernel-ppc64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- ae1877b162fdb5d16cb3a480414a7ce5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
		</criteria>
	</criteria>
	<!-- c18b1f136ef4e3baf765c9110ee8e8ef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- f715eb6e5d39ac340637af52966bcd6e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3849</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3849" source="CVE"/>
	<description>
	The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8b70aa4d05f245a4b664290a8bf4da13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065639" comment="kernel-bigsmp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065648" comment="kernel-kdumppae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065649" comment="kernel-vmi less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065650" comment="kernel-vmipae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 95d48e84e8843770d7b57f4005cf33bd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070814" comment="kernel-iseries64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070815" comment="kernel-ppc64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- ae1877b162fdb5d16cb3a480414a7ce5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
		</criteria>
	</criteria>
	<!-- c18b1f136ef4e3baf765c9110ee8e8ef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- f715eb6e5d39ac340637af52966bcd6e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3850</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3850" source="CVE"/>
	<description>
	The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8b70aa4d05f245a4b664290a8bf4da13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065639" comment="kernel-bigsmp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065648" comment="kernel-kdumppae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065649" comment="kernel-vmi less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065650" comment="kernel-vmipae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 95d48e84e8843770d7b57f4005cf33bd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070814" comment="kernel-iseries64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070815" comment="kernel-ppc64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- ae1877b162fdb5d16cb3a480414a7ce5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
		</criteria>
	</criteria>
	<!-- c18b1f136ef4e3baf765c9110ee8e8ef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- f715eb6e5d39ac340637af52966bcd6e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3855</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3855" source="CVE"/>
	<description>
	Buffer overflow in the ft_var_readpackedpoints function in truetype/ttgxvar.c in FreeType 2.4.3 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted TrueType GX font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 8e613813376cd82ca7e15523f13bfa7e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067752" comment="freetype2-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067756" comment="freetype2-64bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067753" comment="freetype2-devel-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067757" comment="freetype2-devel-64bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067754" comment="freetype2-devel less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067758" comment="freetype2-x86 less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067755" comment="freetype2 less than 2.1.10-18.25.11"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067752" comment="freetype2-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067753" comment="freetype2-devel-32bit less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067754" comment="freetype2-devel less than 2.1.10-18.25.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067755" comment="freetype2 less than 2.1.10-18.25.11"/>
			</criteria>
		</criteria></criteria>
	<!-- a4b2ad9796d6e3860ce0ff169310f2cd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067752" comment="freetype2-32bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067756" comment="freetype2-64bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067753" comment="freetype2-devel-32bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067757" comment="freetype2-devel-64bit less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067754" comment="freetype2-devel less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067758" comment="freetype2-x86 less than 2.1.10-18.25.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067755" comment="freetype2 less than 2.1.10-18.25.11"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3856</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3856" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3856" source="CVE"/>
	<description>
	ld.so in the GNU C Library (aka glibc or libc6) before 2.11.3, and 2.12.x before 2.12.2, does not properly restrict use of the LD_AUDIT environment variable to reference dynamic shared objects (DSOs) as audit objects, which allows local users to gain privileges by leveraging an unsafe DSO located in a trusted library directory, as demonstrated by libpcprofile.so.
	</description>
 </metadata>
<!-- a7e1bffd1e2cae6bb5c9bbff3d3f9de2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070518" comment="glibc-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070519" comment="glibc-devel-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070520" comment="glibc-locale-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070521" comment="glibc-locale-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070526" comment="glibc-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070508" comment="glibc-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070509" comment="glibc-devel-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070510" comment="glibc-devel less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070512" comment="glibc-i18ndata less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070513" comment="glibc-info less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070514" comment="glibc-locale-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070515" comment="glibc-locale less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070516" comment="glibc less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070517" comment="nscd less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070527" comment="glibc-dceext-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070528" comment="glibc-dceext-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070529" comment="glibc-dceext-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070530" comment="glibc-dceext less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070511" comment="glibc-html less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070522" comment="glibc-profile-32bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070523" comment="glibc-profile-64bit less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070524" comment="glibc-profile-x86 less than 2.4-31.77.76.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070525" comment="glibc-profile less than 2.4-31.77.76.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3870</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3870" source="CVE"/>
	<description>
	The utf8_decode function in PHP before 5.3.4 does not properly handle non-shortest form UTF-8 encoding and ill-formed subsequences in UTF-8 data, which makes it easier for remote attackers to bypass cross-site scripting (XSS) and SQL injection protection mechanisms via a crafted string.
	</description>
 </metadata>
<!-- f4ae7724bd9c0b013702329c72554501 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064725" comment="apache2-mod_php5 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064726" comment="php5-bcmath less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064727" comment="php5-bz2 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064728" comment="php5-calendar less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064729" comment="php5-ctype less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064730" comment="php5-curl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064731" comment="php5-dba less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064732" comment="php5-dbase less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064733" comment="php5-devel less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064734" comment="php5-dom less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064735" comment="php5-exif less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064736" comment="php5-fastcgi less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064737" comment="php5-ftp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064738" comment="php5-gd less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064739" comment="php5-gettext less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064740" comment="php5-gmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064741" comment="php5-hash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064742" comment="php5-iconv less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064743" comment="php5-imap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064744" comment="php5-json less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064745" comment="php5-ldap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064746" comment="php5-mbstring less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064747" comment="php5-mcrypt less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064748" comment="php5-mhash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064749" comment="php5-mysql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064750" comment="php5-ncurses less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064751" comment="php5-odbc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064752" comment="php5-openssl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064753" comment="php5-pcntl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064754" comment="php5-pdo less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064755" comment="php5-pear less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064756" comment="php5-pgsql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064757" comment="php5-posix less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064758" comment="php5-pspell less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064759" comment="php5-shmop less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064760" comment="php5-snmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064761" comment="php5-soap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064762" comment="php5-sockets less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064763" comment="php5-sqlite less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064764" comment="php5-suhosin less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064765" comment="php5-sysvmsg less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064766" comment="php5-sysvsem less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064767" comment="php5-sysvshm less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064768" comment="php5-tokenizer less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064769" comment="php5-wddx less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064770" comment="php5-xmlreader less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064771" comment="php5-xmlrpc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064772" comment="php5-xsl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064773" comment="php5-zlib less than 5.2.14-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064725" comment="apache2-mod_php5 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064726" comment="php5-bcmath less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064727" comment="php5-bz2 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064728" comment="php5-calendar less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064729" comment="php5-ctype less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064730" comment="php5-curl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064731" comment="php5-dba less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064732" comment="php5-dbase less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064733" comment="php5-devel less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064734" comment="php5-dom less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064735" comment="php5-exif less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064736" comment="php5-fastcgi less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064737" comment="php5-ftp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064738" comment="php5-gd less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064739" comment="php5-gettext less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064740" comment="php5-gmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064742" comment="php5-iconv less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064743" comment="php5-imap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064744" comment="php5-json less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064745" comment="php5-ldap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064746" comment="php5-mbstring less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064747" comment="php5-mcrypt less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064748" comment="php5-mhash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064749" comment="php5-mysql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064750" comment="php5-ncurses less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064751" comment="php5-odbc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064752" comment="php5-openssl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064753" comment="php5-pcntl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064754" comment="php5-pdo less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064755" comment="php5-pear less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064756" comment="php5-pgsql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064757" comment="php5-posix less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064758" comment="php5-pspell less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064759" comment="php5-shmop less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064760" comment="php5-snmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064761" comment="php5-soap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064762" comment="php5-sockets less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064763" comment="php5-sqlite less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064764" comment="php5-suhosin less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064765" comment="php5-sysvmsg less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064766" comment="php5-sysvsem less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064767" comment="php5-sysvshm less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064768" comment="php5-tokenizer less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064769" comment="php5-wddx less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064770" comment="php5-xmlreader less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064771" comment="php5-xmlrpc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064772" comment="php5-xsl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064773" comment="php5-zlib less than 5.2.14-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064725" comment="apache2-mod_php5 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064726" comment="php5-bcmath less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064727" comment="php5-bz2 less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064728" comment="php5-calendar less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064729" comment="php5-ctype less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064730" comment="php5-curl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064731" comment="php5-dba less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064732" comment="php5-dbase less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064733" comment="php5-devel less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064734" comment="php5-dom less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064735" comment="php5-exif less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064736" comment="php5-fastcgi less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064737" comment="php5-ftp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064738" comment="php5-gd less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064739" comment="php5-gettext less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064740" comment="php5-gmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064741" comment="php5-hash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064742" comment="php5-iconv less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064743" comment="php5-imap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064745" comment="php5-ldap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064746" comment="php5-mbstring less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064747" comment="php5-mcrypt less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064748" comment="php5-mhash less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064749" comment="php5-mysql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064750" comment="php5-ncurses less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064751" comment="php5-odbc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064752" comment="php5-openssl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064753" comment="php5-pcntl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064754" comment="php5-pdo less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064755" comment="php5-pear less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064756" comment="php5-pgsql less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064757" comment="php5-posix less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064758" comment="php5-pspell less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064759" comment="php5-shmop less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064760" comment="php5-snmp less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064761" comment="php5-soap less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064762" comment="php5-sockets less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064763" comment="php5-sqlite less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064764" comment="php5-suhosin less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064765" comment="php5-sysvmsg less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064766" comment="php5-sysvsem less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064767" comment="php5-sysvshm less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064774" comment="php5-tidy less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064768" comment="php5-tokenizer less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064769" comment="php5-wddx less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064770" comment="php5-xmlreader less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064771" comment="php5-xmlrpc less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064772" comment="php5-xsl less than 5.2.14-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064773" comment="php5-zlib less than 5.2.14-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3873</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3873" source="CVE"/>
	<description>
	The X.25 implementation in the Linux kernel before 2.6.36.2 does not properly parse facilities, which allows remote attackers to cause a denial of service (heap memory corruption and panic) or possibly have unspecified other impact via malformed (1) X25_FAC_CALLING_AE or (2) X25_FAC_CALLED_AE data, related to net/x25/x25_facilities.c and net/x25/x25_in.c, a different vulnerability than CVE-2010-4164.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3875</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3875" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3875" source="CVE"/>
	<description>
	The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3876</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3876" source="CVE"/>
	<description>
	net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3877</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-3877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3877" source="CVE"/>
	<description>
	The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3879</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3879" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3879" source="CVE"/>
	<description>
	FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a different vulnerability than CVE-2010-0789.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7b2fb9f684a28e8120a1bdce990ad5fe -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066714" comment="util-linux less than 2.12r-35.41.43.7"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066711" comment="fuse-devel less than 2.7.2-15.10.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066712" comment="fuse less than 2.7.2-15.10.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066713" comment="libfuse2 less than 2.7.2-15.10.11.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9844c158be14e3a6350b6dbf6348ca73 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067089" comment="fuse-devel less than 2.7.2-15.10.11.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067090" comment="fuse less than 2.7.2-15.10.11.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067091" comment="libfuse2 less than 2.7.2-15.10.11.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3880</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-3880" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3880" source="CVE"/>
	<description>
	net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20103912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-3912</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-3912" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3912" source="CVE"/>
	<description>
	The supportconfig script in supportutils in SUSE Linux Enterprise 11 SP1 and 10 SP3 does not "disguise passwords" in configuration files, which has unknown impact and attack vectors.
	</description>
 </metadata>
<!-- e7adf72b8c900fa6fdfde03604b70e7b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065453" comment="supportutils less than 1.20-0.7.6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4008</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4008" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4008" source="CVE"/>
	<description>
	libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
	</description>
 </metadata>
<!-- 3efe402116f13a34d20f8da17a6118fb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064589" comment="libxml2-32bit less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064593" comment="libxml2-64bit less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064590" comment="libxml2-devel-32bit less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064594" comment="libxml2-devel-64bit less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064591" comment="libxml2-devel less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064595" comment="libxml2-x86 less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064592" comment="libxml2 less than 2.6.23-15.23.13"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009064589" comment="libxml2-32bit less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064590" comment="libxml2-devel-32bit less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064591" comment="libxml2-devel less than 2.6.23-15.23.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009064592" comment="libxml2 less than 2.6.23-15.23.13"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4014</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4014" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4014" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 21568d23e4ef4a4e89013a0702d00426 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066646" comment="postgresql-contrib less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066643" comment="postgresql-devel less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066647" comment="postgresql-docs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066644" comment="postgresql-libs-32bit less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066648" comment="postgresql-libs-64bit less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066649" comment="postgresql-libs-x86 less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066645" comment="postgresql-libs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066650" comment="postgresql-pl less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066651" comment="postgresql-server less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066652" comment="postgresql less than 8.1.22-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066646" comment="postgresql-contrib less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066643" comment="postgresql-devel less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066647" comment="postgresql-docs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066644" comment="postgresql-libs-32bit less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066645" comment="postgresql-libs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066650" comment="postgresql-pl less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066651" comment="postgresql-server less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066652" comment="postgresql less than 8.1.22-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066646" comment="postgresql-contrib less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066643" comment="postgresql-devel less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066647" comment="postgresql-docs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066650" comment="postgresql-pl less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066651" comment="postgresql-server less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066652" comment="postgresql less than 8.1.22-0.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5109394251782bc1cad672fa0c8120a9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067095" comment="postgresql-contrib less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067092" comment="postgresql-devel less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067096" comment="postgresql-docs less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067093" comment="postgresql-libs-32bit less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067097" comment="postgresql-libs-64bit less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067098" comment="postgresql-libs-x86 less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067094" comment="postgresql-libs less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067099" comment="postgresql-pl less than 8.1.22-0.6.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067100" comment="postgresql-server less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067101" comment="postgresql less than 8.1.22-0.6.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067095" comment="postgresql-contrib less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067092" comment="postgresql-devel less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067096" comment="postgresql-docs less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067099" comment="postgresql-pl less than 8.1.22-0.6.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067100" comment="postgresql-server less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067101" comment="postgresql less than 8.1.22-0.6.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4015</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4015" source="CVE"/>
	<description>
	Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 21568d23e4ef4a4e89013a0702d00426 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066646" comment="postgresql-contrib less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066643" comment="postgresql-devel less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066647" comment="postgresql-docs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066644" comment="postgresql-libs-32bit less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066648" comment="postgresql-libs-64bit less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066649" comment="postgresql-libs-x86 less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066645" comment="postgresql-libs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066650" comment="postgresql-pl less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066651" comment="postgresql-server less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066652" comment="postgresql less than 8.1.22-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066646" comment="postgresql-contrib less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066643" comment="postgresql-devel less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066647" comment="postgresql-docs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066644" comment="postgresql-libs-32bit less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066645" comment="postgresql-libs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066650" comment="postgresql-pl less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066651" comment="postgresql-server less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066652" comment="postgresql less than 8.1.22-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066646" comment="postgresql-contrib less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066643" comment="postgresql-devel less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066647" comment="postgresql-docs less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066650" comment="postgresql-pl less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066651" comment="postgresql-server less than 8.1.22-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066652" comment="postgresql less than 8.1.22-0.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5109394251782bc1cad672fa0c8120a9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067095" comment="postgresql-contrib less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067092" comment="postgresql-devel less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067096" comment="postgresql-docs less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067093" comment="postgresql-libs-32bit less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067097" comment="postgresql-libs-64bit less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067098" comment="postgresql-libs-x86 less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067094" comment="postgresql-libs less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067099" comment="postgresql-pl less than 8.1.22-0.6.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067100" comment="postgresql-server less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067101" comment="postgresql less than 8.1.22-0.6.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067095" comment="postgresql-contrib less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067092" comment="postgresql-devel less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067096" comment="postgresql-docs less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067099" comment="postgresql-pl less than 8.1.22-0.6.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067100" comment="postgresql-server less than 8.1.22-0.6.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067101" comment="postgresql less than 8.1.22-0.6.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4020</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4020" source="CVE"/>
	<description>
	MIT Kerberos 5 (aka krb5) 1.8.x through 1.8.3 does not reject RC4 key-derivation checksums, which might allow remote authenticated users to forge a (1) AD-SIGNEDPATH or (2) AD-KDC-ISSUED signature, and possibly gain privileges, by leveraging the small key space that results from certain one-byte stream-cipher operations.
	</description>
 </metadata>
<!-- d0d5ba0d668fb6a84e2d0628a4a483b9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065142" comment="krb5-64bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065145" comment="krb5-devel-64bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065147" comment="krb5-x86 less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4021" source="CVE"/>
	<description>
	The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.7 does not properly restrict the use of TGT credentials for armoring TGS requests, which might allow remote authenticated users to impersonate a client by rewriting an inner request, aka a "KrbFastReq forgery issue."
	</description>
 </metadata>
<!-- d0d5ba0d668fb6a84e2d0628a4a483b9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065142" comment="krb5-64bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065145" comment="krb5-devel-64bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065147" comment="krb5-x86 less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065137" comment="krb5-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065138" comment="krb5-client less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065139" comment="krb5-devel-32bit less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065140" comment="krb5-devel less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065141" comment="krb5 less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065143" comment="krb5-apps-clients less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065144" comment="krb5-apps-servers less than 1.4.3-19.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065146" comment="krb5-server less than 1.4.3-19.47.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4054</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4054" source="CVE"/>
	<description>
	The gs_type2_interpret function in Ghostscript allows remote attackers to cause a denial of service (incorrect pointer dereference and application crash) via crafted font data in a compressed data stream, aka bug 691043.
	</description>
 </metadata>
<!-- ed33b07c67b3e3c685b564c2b6d267ec -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073813" comment="ghostscript-fonts-other less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073818" comment="ghostscript-fonts-rus less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073814" comment="ghostscript-fonts-std less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073815" comment="ghostscript-library less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073819" comment="ghostscript-omni less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073816" comment="ghostscript-x11 less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073820" comment="libgimpprint-devel less than 4.2.7-62.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073817" comment="libgimpprint less than 4.2.7-62.14.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073818" comment="ghostscript-fonts-rus less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073819" comment="ghostscript-omni less than 8.15.4-16.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073820" comment="libgimpprint-devel less than 4.2.7-62.14.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4072</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4072" source="CVE"/>
	<description>
	The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4073</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4073" source="CVE"/>
	<description>
	The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4075</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4075" source="CVE"/>
	<description>
	The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4076</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4076" source="CVE"/>
	<description>
	The rs_ioctl function in drivers/char/amiserial.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4077</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4077" source="CVE"/>
	<description>
	The ntty_ioctl_tiocgicount function in drivers/char/nozomi.c in the Linux kernel 2.6.36.1 and earlier does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4078</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4078" source="CVE"/>
	<description>
	The sisfb_ioctl function in drivers/video/sis/sis_main.c in the Linux kernel before 2.6.36-rc6 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FBIOGET_VBLANK ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4080</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4080" source="CVE"/>
	<description>
	The snd_hdsp_hwdep_ioctl function in sound/pci/rme9652/hdsp.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSP_IOCTL_GET_CONFIG_INFO ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4081</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4081" source="CVE"/>
	<description>
	The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4083</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4083" source="CVE"/>
	<description>
	The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4150</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4150" source="CVE"/>
	<description>
	Double free vulnerability in the imap_do_open function in the IMAP extension (ext/imap/php_imap.c) in PHP 5.2 before 5.2.15 and 5.3 before 5.3.4 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4157</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4157" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4157" source="CVE"/>
	<description>
	Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4158</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4158" source="CVE"/>
	<description>
	The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4159</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4159" source="CVE"/>
	<description>
	Untrusted search path vulnerability in metadata/loader.c in Mono 2.8 and earlier allows local users to gain privileges via a Trojan horse shared library in the current working directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25377b3023006da1c0af5164dd40ab70 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067826" comment="mono-core-32bit less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067840" comment="mono-core-x86 less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067827" comment="mono-core less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067828" comment="mono-data-firebird less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067829" comment="mono-data-oracle less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067830" comment="mono-data-postgresql less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067831" comment="mono-data-sqlite less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067832" comment="mono-data-sybase less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067833" comment="mono-data less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067836" comment="mono-locale-extras less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067837" comment="mono-nunit less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067838" comment="mono-web less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067839" comment="mono-winforms less than 1.2.2-12.30.14"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067826" comment="mono-core-32bit less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067827" comment="mono-core less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067828" comment="mono-data-firebird less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067829" comment="mono-data-oracle less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067830" comment="mono-data-postgresql less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067831" comment="mono-data-sqlite less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067832" comment="mono-data-sybase less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067833" comment="mono-data less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067836" comment="mono-locale-extras less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067837" comment="mono-nunit less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067838" comment="mono-web less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067839" comment="mono-winforms less than 1.2.2-12.30.14"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067824" comment="bytefx-data-mysql less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067825" comment="ibm-data-db2 less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067826" comment="mono-core-32bit less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067840" comment="mono-core-x86 less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067827" comment="mono-core less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067828" comment="mono-data-firebird less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067829" comment="mono-data-oracle less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067830" comment="mono-data-postgresql less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067831" comment="mono-data-sqlite less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067832" comment="mono-data-sybase less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067833" comment="mono-data less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067834" comment="mono-devel less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067835" comment="mono-extras less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067841" comment="mono-jscript less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067836" comment="mono-locale-extras less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067837" comment="mono-nunit less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067838" comment="mono-web less than 1.2.2-12.30.14"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067839" comment="mono-winforms less than 1.2.2-12.30.14"/>
			</criteria>
		</criteria></criteria>
	<!-- bf099e5a282cf118b8b9ed19383ea0e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068079" comment="mono-core-32bit less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068093" comment="mono-core-x86 less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068080" comment="mono-core less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068081" comment="mono-data-firebird less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068082" comment="mono-data-oracle less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068083" comment="mono-data-postgresql less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068084" comment="mono-data-sqlite less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068085" comment="mono-data-sybase less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068086" comment="mono-data less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068089" comment="mono-locale-extras less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068090" comment="mono-nunit less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068091" comment="mono-web less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068092" comment="mono-winforms less than 1.2.2-12.30.16"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068077" comment="bytefx-data-mysql less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068078" comment="ibm-data-db2 less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068079" comment="mono-core-32bit less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068093" comment="mono-core-x86 less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068080" comment="mono-core less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068081" comment="mono-data-firebird less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068082" comment="mono-data-oracle less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068083" comment="mono-data-postgresql less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068084" comment="mono-data-sqlite less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068085" comment="mono-data-sybase less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068086" comment="mono-data less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068087" comment="mono-devel less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068088" comment="mono-extras less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068094" comment="mono-jscript less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068089" comment="mono-locale-extras less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068090" comment="mono-nunit less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068091" comment="mono-web less than 1.2.2-12.30.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068092" comment="mono-winforms less than 1.2.2-12.30.16"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4160</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4160" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8b70aa4d05f245a4b664290a8bf4da13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065639" comment="kernel-bigsmp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065648" comment="kernel-kdumppae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065649" comment="kernel-vmi less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065650" comment="kernel-vmipae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 95d48e84e8843770d7b57f4005cf33bd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070814" comment="kernel-iseries64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070815" comment="kernel-ppc64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- ae1877b162fdb5d16cb3a480414a7ce5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
		</criteria>
	</criteria>
	<!-- c18b1f136ef4e3baf765c9110ee8e8ef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- f715eb6e5d39ac340637af52966bcd6e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4162" source="CVE"/>
	<description>
	Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4163</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4163" source="CVE"/>
	<description>
	The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.36.2 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4164</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4164" source="CVE"/>
	<description>
	Multiple integer underflows in the x25_parse_facilities function in net/x25/x25_facilities.c in the Linux kernel before 2.6.36.2 allow remote attackers to cause a denial of service (system crash) via malformed X.25 (1) X25_FAC_CLASS_A, (2) X25_FAC_CLASS_B, (3) X25_FAC_CLASS_C, or (4) X25_FAC_CLASS_D facility data, a different vulnerability than CVE-2010-3873.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d433ce13217ec9e95c2b22bce28b8ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065148" comment="kernel-bigsmp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065157" comment="kernel-kdumppae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065158" comment="kernel-vmi less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065159" comment="kernel-vmipae less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065154" comment="kernel-xenpae less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- 674eb707cae3a31be66788e116641a9a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065150" comment="kernel-smp less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065153" comment="kernel-xen less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria></criteria>
	<!-- 7a6102f48e04658e517624d16e7806bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065155" comment="kernel-debug less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- 8bc9a9f71e0364816351d414eb3c9832 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
		</criteria>
	</criteria>
	<!-- c12e832d9f0b5b30c9d4e408ab99b34d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065149" comment="kernel-default less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065160" comment="kernel-iseries64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065161" comment="kernel-ppc64 less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065151" comment="kernel-source less than 2.6.16.60-0.74.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065152" comment="kernel-syms less than 2.6.16.60-0.74.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065156" comment="kernel-kdump less than 2.6.16.60-0.74.7"/>
		</criteria></criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4180</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4180" source="CVE"/>
	<description>
	OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6deef59a2e94ee7d0f87aa2f497078c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
		</criteria>
	</criteria>
	<!-- 6e0b29b0ea4fabee3307650366820359 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068095" comment="openssl-32bit less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068096" comment="openssl-64bit less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068097" comment="openssl-devel-32bit less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068098" comment="openssl-devel-64bit less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068099" comment="openssl-devel less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068100" comment="openssl-doc less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068101" comment="openssl-x86 less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068102" comment="openssl less than 0.9.8a-18.45.45.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068095" comment="openssl-32bit less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068097" comment="openssl-devel-32bit less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068099" comment="openssl-devel less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068100" comment="openssl-doc less than 0.9.8a-18.45.45.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068102" comment="openssl less than 0.9.8a-18.45.45.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068100" comment="openssl-doc less than 0.9.8a-18.45.45.1"/>
		</criteria></criteria>
	<!-- 78caf50c2261c865e06e92ff68d948da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069581" comment="compat-openssl097g-64bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069582" comment="compat-openssl097g-x86 less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069579" comment="compat-openssl097g-32bit less than 0.9.7g-13.21.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069580" comment="compat-openssl097g less than 0.9.7g-13.21.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ad2c03e5db24ef9c3d0c1c789a0f12fc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068103" comment="openssl-32bit less than 0.9.8a-18.50.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068107" comment="openssl-64bit less than 0.9.8a-18.50.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068104" comment="openssl-devel-32bit less than 0.9.8a-18.50.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068108" comment="openssl-devel-64bit less than 0.9.8a-18.50.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068105" comment="openssl-devel less than 0.9.8a-18.50.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068109" comment="openssl-doc less than 0.9.8a-18.50.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068110" comment="openssl-x86 less than 0.9.8a-18.50.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068106" comment="openssl less than 0.9.8a-18.50.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068109" comment="openssl-doc less than 0.9.8a-18.50.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4226</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4226" source="CVE"/>
	<description>
	cpio, as used in build 2007.05.10, 2010.07.28, and possibly other versions, allows remote attackers to overwrite arbitrary files via a symlink within an RPM package archive.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01aa176a6b475fa60eef966d72e3024a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066654" comment="build less than 2007.05.10-0.16.1"/>
	</criteria>
	<!-- 679b825d6e5f56a1fc59146d045b9cd0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066654" comment="build less than 2007.05.10-0.16.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4242</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4242" source="CVE"/>
	<description>
	The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4248</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4248" source="CVE"/>
	<description>
	Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4249</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4249" source="CVE"/>
	<description>
	The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4251</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4251" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4251" source="CVE"/>
	<description>
	The socket implementation in net/core/sock.c in the Linux kernel before 2.6.34 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service (memory consumption) by sending a large amount of network traffic, as demonstrated by netperf UDP tests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4253</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4253" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4253" source="CVE"/>
	<description>
	Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PNG file in an ODF or Microsoft Office document, as demonstrated by a PowerPoint (aka PPT) document.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4255</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4255" source="CVE"/>
	<description>
	The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
	</description>
 </metadata>
<!-- bfb73bc4eccf58e02a14ae841699467c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069159" comment="virt-manager less than 0.5.3-0.33.32.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069160" comment="xen-devel less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069161" comment="xen-doc-html less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069162" comment="xen-doc-pdf less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069163" comment="xen-doc-ps less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069164" comment="xen-kmp-bigsmp less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069173" comment="xen-kmp-debug less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069165" comment="xen-kmp-default less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069174" comment="xen-kmp-kdump less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069175" comment="xen-kmp-kdumppae less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069166" comment="xen-kmp-smp less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069176" comment="xen-kmp-vmi less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069177" comment="xen-kmp-vmipae less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069167" comment="xen-libs-32bit less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069168" comment="xen-libs less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069169" comment="xen-tools-domU less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069170" comment="xen-tools-ioemu less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069171" comment="xen-tools less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069172" comment="xen less than 3.2.3_17040_24-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069159" comment="virt-manager less than 0.5.3-0.33.32.14"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069160" comment="xen-devel less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069161" comment="xen-doc-html less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069162" comment="xen-doc-pdf less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069163" comment="xen-doc-ps less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069173" comment="xen-kmp-debug less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069165" comment="xen-kmp-default less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069174" comment="xen-kmp-kdump less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069166" comment="xen-kmp-smp less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069167" comment="xen-libs-32bit less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069168" comment="xen-libs less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069169" comment="xen-tools-domU less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069170" comment="xen-tools-ioemu less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069171" comment="xen-tools less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069172" comment="xen less than 3.2.3_17040_24-0.4.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069160" comment="xen-devel less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069173" comment="xen-kmp-debug less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069174" comment="xen-kmp-kdump less than 3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069167" comment="xen-libs-32bit less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069168" comment="xen-libs less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069170" comment="xen-tools-ioemu less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069171" comment="xen-tools less than 3.2.3_17040_24-0.4.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069172" comment="xen less than 3.2.3_17040_24-0.4.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4258</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4258" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4258" source="CVE"/>
	<description>
	The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 8b70aa4d05f245a4b664290a8bf4da13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065639" comment="kernel-bigsmp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065648" comment="kernel-kdumppae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065649" comment="kernel-vmi less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065650" comment="kernel-vmipae less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065645" comment="kernel-xenpae less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 95d48e84e8843770d7b57f4005cf33bd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070814" comment="kernel-iseries64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070815" comment="kernel-ppc64 less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- ae1877b162fdb5d16cb3a480414a7ce5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
		</criteria>
	</criteria>
	<!-- c18b1f136ef4e3baf765c9110ee8e8ef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
		</criteria></criteria>
	<!-- f715eb6e5d39ac340637af52966bcd6e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065640" comment="kernel-default less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065641" comment="kernel-smp less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065642" comment="kernel-source less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065643" comment="kernel-syms less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009065646" comment="kernel-debug less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065647" comment="kernel-kdump less than 2.6.16.60-0.76.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009065644" comment="kernel-xen less than 2.6.16.60-0.76.8"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4260</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4260" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV before 0.96.5 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document, aka (1) "bb #2358" and (2) "bb #2396."
	</description>
 </metadata>
<!-- a9212582ff8997026a854501e8d121e9 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065079" comment="clamav less than 0.96.5-0.4.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4261</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4261" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4261" source="CVE"/>
	<description>
	Off-by-one error in the icon_cb function in pe_icons.c in libclamav in ClamAV before 0.96.5 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- a9212582ff8997026a854501e8d121e9 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065079" comment="clamav less than 0.96.5-0.4.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4300</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4300" source="CVE"/>
	<description>
	Heap-based buffer overflow in the dissect_ldss_transfer function (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an LDSS packet with a long digest line that triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4301</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4301" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4301" source="CVE"/>
	<description>
	epan/dissectors/packet-zbee-zcl.c in the ZigBee ZCL dissector in Wireshark 1.4.0 through 1.4.1 allows remote attackers to cause a denial of service (infinite loop) via a crafted ZCL packet, related to Discover Attributes.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4342</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4342" source="CVE"/>
	<description>
	The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4352</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4352" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4352" source="CVE"/>
	<description>
	Stack consumption vulnerability in D-Bus (aka DBus) before 1.4.1 allows local users to cause a denial of service (daemon crash) via a message containing many nested variants.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- c666fe3b8224eb67e03aff3ec8053e7b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068048" comment="dbus-1-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068051" comment="dbus-1-glib-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068052" comment="dbus-1-glib-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068059" comment="dbus-1-qt3-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068061" comment="dbus-1-qt3-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068064" comment="dbus-1-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068066" comment="dbus-1-devel-doc less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
			</criteria>
		</criteria></criteria>
	<!-- dde20c718132c54e40619cef79c34890 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068047" comment="dbus-1-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068048" comment="dbus-1-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068050" comment="dbus-1-glib-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068051" comment="dbus-1-glib-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068052" comment="dbus-1-glib-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068053" comment="dbus-1-glib less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068054" comment="dbus-1-gtk less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068056" comment="dbus-1-mono less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068057" comment="dbus-1-python less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068058" comment="dbus-1-qt3-32bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068059" comment="dbus-1-qt3-64bit less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068060" comment="dbus-1-qt3-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068061" comment="dbus-1-qt3-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068062" comment="dbus-1-qt3 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068063" comment="dbus-1-x11 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068064" comment="dbus-1-x86 less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068065" comment="dbus-1 less than 0.60-33.29.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068066" comment="dbus-1-devel-doc less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068049" comment="dbus-1-devel less than 0.60-33.29.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068055" comment="dbus-1-java less than 0.60-33.29.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4409</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4409" source="CVE"/>
	<description>
	Integer overflow in the NumberFormatter::getSymbol (aka numfmt_get_symbol) function in PHP 5.3.3 and earlier allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument.
	</description>
 </metadata>
<!-- e7ea96f0f245f1bd2f74770ba314e188 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107275" comment="libicu-32bit less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107273" comment="libicu-32bit less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107276" comment="libicu-64bit less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107277" comment="libicu-devel-32bit less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107278" comment="libicu-devel-32bit less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107279" comment="libicu-devel-64bit less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107280" comment="libicu-devel less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107281" comment="libicu-devel less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107282" comment="libicu-doc less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107283" comment="libicu-doc less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107284" comment="libicu-x86 less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107285" comment="libicu less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107274" comment="libicu less than 3.4-16.13.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107286" comment="icu-data less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107287" comment="icu-data less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107288" comment="icu less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107272" comment="icu less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107277" comment="libicu-devel-32bit less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107278" comment="libicu-devel-32bit less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107279" comment="libicu-devel-64bit less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107280" comment="libicu-devel less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107281" comment="libicu-devel less than 3.4-16.13.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107282" comment="libicu-doc less than 3.4-16.13.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107283" comment="libicu-doc less than 3.4-16.13.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4410</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4410" source="CVE"/>
	<description>
	CRLF injection vulnerability in the header function in (1) CGI.pm before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via vectors related to non-whitespace characters preceded by newline characters, a different vulnerability than CVE-2010-2761 and CVE-2010-3172.
	</description>
 </metadata>
<!-- aa08850f4b8bd72b4cd28674c6bdf3d6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065608" comment="perl-64bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065609" comment="perl-x86 less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4411</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4411" source="CVE"/>
	<description>
	Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unknown vectors.  NOTE: this issue exists because of an incomplete fix for CVE-2010-2761.
	</description>
 </metadata>
<!-- aa08850f4b8bd72b4cd28674c6bdf3d6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065608" comment="perl-64bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065609" comment="perl-x86 less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009065606" comment="perl-32bit less than 5.8.8-14.17.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009065607" comment="perl less than 5.8.8-14.17.15"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4422</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4422" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4447</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4447" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4475.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4448</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4448" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue involves "DNS cache poisoning by untrusted applets."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4450</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
	</affected>
	<reference ref_id="CVE-2010-4450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4450" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows local standalone applications to affect confidentiality, integrity, and availability via unknown vectors related to Launcher.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is an untrusted search path vulnerability involving an empty LD_LIBRARY_PATH environment variable.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4452</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4452" source="CVE"/>
	<description>
	Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4454</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4454" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4462 and CVE-2010-4473.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4462</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4462" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4473.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4463</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4463" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4465</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4465" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or "clipboard access in Applets."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4466</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4466" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, Solaris, and, Linux; 5.0 Update 27 and earlier for Windows; and 1.4.2_29 and earlier for Windows allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4467</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4467" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 10 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4468</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4468" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to JDBC.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4471</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4471" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D.  NOTE: the previous information was obtained from the February 2011 CPU.  Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4473</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4473" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4462.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4475</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4475" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4447.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 5cdbae1443b7790944a7d5df3a40ab00 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067770" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067781" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067771" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067772" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067774" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067775" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067776" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067777" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067778" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.18"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067780" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.18"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4476</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2010-4476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476" source="CVE"/>
	<description>
	The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0ed1b37ce3c45600ce39cf816fbcd975 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066409" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066410" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066411" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066404" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066412" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066413" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066405" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066406" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066414" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066407" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066408" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.5.1"/>
		</criteria>
	</criteria>
	<!-- 29cbf3b3cf8c9af6e251c03724593fb5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.1-1.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067792" comment="java-1_6_0-ibm less than 1.6.0_sr9.1-1.8.4"/>
		</criteria>
	</criteria>
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 8451c9123666d5000536667668ce491d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067766" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067767" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067768" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.8-1.7.13"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067769" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.13"/>
		</criteria>
	</criteria>
	<!-- ac2e446384cdeb74511d6cd5eb10eb59 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066388" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066379" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066384" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066385" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066377" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066378" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066381" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066382" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066383" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066387" comment="java-1_5_0-ibm less than 1.5.0_sr12.3-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c4e94000cf9daf61d2273c8fa5dd22c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066038" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066039" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066040" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066041" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066038" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.8-1.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066041" comment="java-1_4_2-ibm less than 1.4.2_sr13.8-1.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4526</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4526" source="CVE"/>
	<description>
	Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4527</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4527" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4527" source="CVE"/>
	<description>
	The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4529</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4529" source="CVE"/>
	<description>
	Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4530</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4530" source="CVE"/>
	<description>
	Signedness error in ccid_serial.c in libccid in the USB Chip/Smart Card Interface Devices (CCID) driver, as used in pcscd in PCSC-Lite 1.5.3 and possibly other products, allows physically proximate attackers to execute arbitrary code via a smart card with a crafted serial number that causes a negative value to be used in a memcpy operation, which triggers a buffer overflow.  NOTE: some sources refer to this issue as an integer overflow.
	</description>
 </metadata>
<!-- c499a38a32197f61e21a5e8675b87308 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065699" comment="pcsc-lite-devel less than 1.2.9_beta9-17.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065700" comment="pcsc-lite less than 1.2.9_beta9-17.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4531</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4531" source="CVE"/>
	<description>
	Stack-based buffer overflow in the ATRDecodeAtr function in the Answer-to-Reset (ATR) Handler (atrhandler.c) for pcscd in PCSC-Lite 1.5.3, and possibly other 1.5.x and 1.6.x versions, allows physically proximate attackers to cause a denial of service (crash) and possibly execute arbitrary code via a smart card with an ATR message containing a long attribute value.
	</description>
 </metadata>
<!-- c499a38a32197f61e21a5e8675b87308 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065699" comment="pcsc-lite-devel less than 1.2.9_beta9-17.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065700" comment="pcsc-lite less than 1.2.9_beta9-17.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4538</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4538" source="CVE"/>
	<description>
	Buffer overflow in the sect_enttec_dmx_da function in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ENTTEC DMX packet with Run Length Encoding (RLE) compression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4539</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4539" source="CVE"/>
	<description>
	The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
	</description>
 </metadata>
<!-- 78744d5d0617a4128e10cb2ec6385755 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065891" comment="cvs2svn less than 1.3.0-30.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065889" comment="subversion-devel less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065892" comment="subversion-python less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065893" comment="subversion-server less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065894" comment="subversion-tools less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065890" comment="subversion less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065895" comment="viewcvs less than 1.0.5-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4540</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4540" source="CVE"/>
	<description>
	Stack-based buffer overflow in the load_preset_response function in plug-ins/lighting/lighting-ui.c in the "LIGHTING EFFECTS &gt; LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Position field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- a5549dac4cabcae467e69f8fa1654a7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066550" comment="gimp-devel less than 2.2.10-22.35.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066551" comment="gimp less than 2.2.10-22.35.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4541" source="CVE"/>
	<description>
	Stack-based buffer overflow in the loadit function in plug-ins/common/sphere-designer.c in the SPHERE DESIGNER plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long "Number of lights" field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself.
	</description>
 </metadata>
<!-- a5549dac4cabcae467e69f8fa1654a7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066550" comment="gimp-devel less than 2.2.10-22.35.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066551" comment="gimp less than 2.2.10-22.35.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4542</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4542" source="CVE"/>
	<description>
	Stack-based buffer overflow in the gfig_read_parameter_gimp_rgb function in plug-ins/gfig/gfig-style.c in the GFIG plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long Foreground field in a plugin configuration file.  NOTE: it may be uncommon to obtain a GIMP plugin configuration file from an untrusted source that is separate from the distribution of the plugin itself. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- a5549dac4cabcae467e69f8fa1654a7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066550" comment="gimp-devel less than 2.2.10-22.35.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066551" comment="gimp less than 2.2.10-22.35.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4543</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4543" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- a5549dac4cabcae467e69f8fa1654a7d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009066550" comment="gimp-devel less than 2.2.10-22.35.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009066551" comment="gimp less than 2.2.10-22.35.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4643</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4643" source="CVE"/>
	<description>
	Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
	</description>
 </metadata>
<!-- 620ba2655e733f37c547ce340f0bdce6 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070746" comment="boost-32bit less than 1.33.1-17.13.2.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070747" comment="boost less than 1.33.1-17.13.2.1"/>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070751" comment="libreoffice-cs less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070753" comment="libreoffice-de-templates less than 8.2.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070754" comment="libreoffice-de less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070757" comment="libreoffice-es less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070759" comment="libreoffice-fr less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070760" comment="libreoffice-galleries less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070761" comment="libreoffice-gnome less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070764" comment="libreoffice-hu less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070765" comment="libreoffice-it less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070766" comment="libreoffice-ja less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070767" comment="libreoffice-kde less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070769" comment="libreoffice-mono less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070773" comment="libreoffice-pl less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070774" comment="libreoffice-pt-BR less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070776" comment="libreoffice-sk less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070779" comment="libreoffice-zh-CN less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070780" comment="libreoffice-zh-TW less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070782" comment="libreoffice less than 3.3.1.2-1.6.2.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070784" comment="myspell-american less than 20040623-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070785" comment="myspell-brazilian less than 20020806-33.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070786" comment="myspell-british less than 20050526-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070787" comment="myspell-catalan less than 0.1-248.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070788" comment="myspell-czech less than 20030907-59.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070789" comment="myspell-danish less than 20050421-27.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070790" comment="myspell-dutch less than 20050719-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070791" comment="myspell-french less than 1.0.1.1-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070792" comment="myspell-german less than 20051213-19.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070793" comment="myspell-greek less than 20041220-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070794" comment="myspell-gujarati less than 20060929-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070795" comment="myspell-hindi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070796" comment="myspell-italian less than 20050711-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070797" comment="myspell-lithuanian less than 20031231-26.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070798" comment="myspell-marathi less than 0.1-20.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070799" comment="myspell-norsk-bokmaal less than 20050308-22.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070801" comment="myspell-polish less than 20051016-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070802" comment="myspell-portuguese less than 20020629-243.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070803" comment="myspell-russian less than 20040406-28.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070804" comment="myspell-slovak less than 20050901-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070805" comment="myspell-slovene less than 20030907-54.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070806" comment="myspell-spanish less than 20051029-20.14.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070807" comment="myspell-swedish less than 20061207-1.12.3.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070808" comment="myspell-xhosa less than 20060123-20.12.3.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4644</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4644" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4644" source="CVE"/>
	<description>
	Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15 allow remote authenticated users to cause a denial of service (memory consumption and daemon crash) via the -g option to the blame command.
	</description>
 </metadata>
<!-- 78744d5d0617a4128e10cb2ec6385755 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065891" comment="cvs2svn less than 1.3.0-30.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065889" comment="subversion-devel less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065892" comment="subversion-python less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065893" comment="subversion-server less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065894" comment="subversion-tools less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065890" comment="subversion less than 1.3.1-1.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065895" comment="viewcvs less than 1.0.5-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4645</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4645" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4645" source="CVE"/>
	<description>
	strtod.c, as used in the zend_strtod function in PHP 5.2 before 5.2.17 and 5.3 before 5.3.5, and other products, allows context-dependent attackers to cause a denial of service (infinite loop) via a certain floating-point value in scientific notation, which is not properly handled in x87 FPU registers, as demonstrated using 2.2250738585072011e-308.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4649</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649" source="CVE"/>
	<description>
	Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4655</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4655" source="CVE"/>
	<description>
	net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4665</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4665" source="CVE"/>
	<description>
	Integer overflow in the ReadDirectory function in tiffdump.c in tiffdump in LibTIFF before 3.9.5 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted TIFF file containing a directory data structure with many directory entries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5f984c45fd590a060e94e0d63e5e2fae -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068149" comment="libtiff-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068153" comment="libtiff-x86 less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 696f188004b4cf9239d43744fa02d72f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068149" comment="libtiff-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068153" comment="libtiff-x86 less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4668</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4668" source="CVE"/>
	<description>
	The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4697</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4697" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Zend engine in PHP before 5.2.15 and 5.3.x before 5.3.4 might allow context-dependent attackers to cause a denial of service (heap memory corruption) or have unspecified other impact via vectors related to use of __set, __get, __isset, and __unset methods on objects accessed by a reference.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4698</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4698" source="CVE"/>
	<description>
	Stack-based buffer overflow in the GD extension in PHP before 5.2.15 and 5.3.x before 5.3.4 allows context-dependent attackers to cause a denial of service (application crash) via a large number of anti-aliasing steps in an argument to the imagepstext function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4699</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2010-4699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4699" source="CVE"/>
	<description>
	The iconv_mime_decode_headers function in the Iconv extension in PHP before 5.3.4 does not properly handle encodings that are unrecognized by the iconv and mbstring (aka Multibyte String) implementations, which allows remote attackers to trigger an incomplete output array, and possibly bypass spam detection or have unspecified other impact, via a crafted Subject header in an e-mail message, as demonstrated by the ks_c_5601-1987 character set.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4756</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2010-4756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4756" source="CVE"/>
	<description>
	The glob implementation in the GNU C Library (aka glibc or libc6) allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.
	</description>
 </metadata>
<!-- 17c15337eaf4f28f28cdc9f9d3d731ec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104319" comment="glibc-32bit less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104320" comment="glibc-devel-32bit less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104321" comment="glibc-devel less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104322" comment="glibc-html less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104323" comment="glibc-i18ndata less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104324" comment="glibc-info less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104325" comment="glibc-locale-32bit less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104326" comment="glibc-locale less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104327" comment="glibc-profile-32bit less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104328" comment="glibc-profile less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104329" comment="glibc less than 2.4-31.77.102.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104330" comment="nscd less than 2.4-31.77.102.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4818</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4818" source="CVE"/>
	<description>
	The GLX extension in X.Org xserver 1.7.7 allows remote authenticated users to cause a denial of service (server crash) and possibly execute arbitrary code via (1) a crafted request that triggers a client swap in glx/glxcmdsswap.c; or (2) a crafted length or (3) a negative value in the screen field in a request to glx/glxcmds.c.
	</description>
 </metadata>
<!-- 926559701859ebd386944eb1075ad07e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073080" comment="xorg-x11-Xnest less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073081" comment="xorg-x11-Xvfb less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073082" comment="xorg-x11-Xvnc less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073083" comment="xorg-x11-devel-32bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073096" comment="xorg-x11-devel-64bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073084" comment="xorg-x11-devel less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073097" comment="xorg-x11-doc less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073085" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073086" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073087" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073088" comment="xorg-x11-fonts-scalable less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073089" comment="xorg-x11-fonts-syriac less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073090" comment="xorg-x11-libs-32bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073098" comment="xorg-x11-libs-64bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073099" comment="xorg-x11-libs-x86 less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073091" comment="xorg-x11-libs less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073092" comment="xorg-x11-man less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073100" comment="xorg-x11-sdk less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073093" comment="xorg-x11-server-glx less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073094" comment="xorg-x11-server less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073095" comment="xorg-x11 less than 6.9.0-50.78.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073081" comment="xorg-x11-Xvfb less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073097" comment="xorg-x11-doc less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073100" comment="xorg-x11-sdk less than 6.9.0-50.78.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20104819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2010-4819</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2010-4819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4819" source="CVE"/>
	<description>
	The ProcRenderAddGlyphs function in the Render extension (render/render.c) in X.Org xserver 1.7.7 and earlier allows local users to read arbitrary memory and possibly cause a denial of service (server crash) via unspecified vectors related to an "input sanitization flaw."
	</description>
 </metadata>
<!-- 926559701859ebd386944eb1075ad07e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073080" comment="xorg-x11-Xnest less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073081" comment="xorg-x11-Xvfb less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073082" comment="xorg-x11-Xvnc less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073083" comment="xorg-x11-devel-32bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073096" comment="xorg-x11-devel-64bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073084" comment="xorg-x11-devel less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073097" comment="xorg-x11-doc less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073085" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073086" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073087" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073088" comment="xorg-x11-fonts-scalable less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073089" comment="xorg-x11-fonts-syriac less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073090" comment="xorg-x11-libs-32bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073098" comment="xorg-x11-libs-64bit less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073099" comment="xorg-x11-libs-x86 less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073091" comment="xorg-x11-libs less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073092" comment="xorg-x11-man less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073100" comment="xorg-x11-sdk less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073093" comment="xorg-x11-server-glx less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073094" comment="xorg-x11-server less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073095" comment="xorg-x11 less than 6.9.0-50.78.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073081" comment="xorg-x11-Xvfb less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073097" comment="xorg-x11-doc less than 6.9.0-50.78.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073100" comment="xorg-x11-sdk less than 6.9.0-50.78.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0013</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0013" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0013" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the HTML Manager Interface in Apache Tomcat 5.5 before 5.5.32, 6.0 before 6.0.30, and 7.0 before 7.0.6 allow remote attackers to inject arbitrary web script or HTML, as demonstrated via the display-name tag.
	</description>
 </metadata>
<!-- 83e045a5ff545cd914da5e807340feb0 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065949" comment="tomcat5-admin-webapps less than 5.5.27-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065950" comment="tomcat5-webapps less than 5.5.27-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065951" comment="tomcat5 less than 5.5.27-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0020</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0020" source="CVE"/>
	<description>
	Heap-based buffer overflow in the pango_ft2_font_render_box_glyph function in pango/pangoft2-render.c in libpango in Pango 1.28.3 and earlier, when the FreeType2 backend is enabled, allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted font file, related to the glyph box for an FT_Bitmap object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 19b402e1327101e776e41e2f05acc81e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068519" comment="firefox3-pango-32bit less than 1.14.5-0.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068520" comment="firefox3-pango less than 1.14.5-0.12.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068521" comment="firefox3-pango-devel less than 1.14.5-0.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068522" comment="firefox3-pango-doc less than 1.14.5-0.12.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4e22ec364f226773949514c5cc614ec3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068519" comment="firefox3-pango-32bit less than 1.14.5-0.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068520" comment="firefox3-pango less than 1.14.5-0.12.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068521" comment="firefox3-pango-devel less than 1.14.5-0.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068522" comment="firefox3-pango-doc less than 1.14.5-0.12.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0051</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0051" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0051" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, does not properly handle certain recursive eval calls, which makes it easier for remote attackers to force a user to respond positively to a dialog question, as demonstrated by a question about granting privileges.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0053</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0053" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0054</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0054" source="CVE"/>
	<description>
	Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving non-local JavaScript variables, aka an "upvarMap" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0055</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0055" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0055" source="CVE"/>
	<description>
	Use-after-free vulnerability in the JSON.stringify method in js3250.dll in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via unspecified vectors related to the js_HasOwnProperty function and garbage collection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0056</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0056" source="CVE"/>
	<description>
	Buffer overflow in the JavaScript engine in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, might allow remote attackers to execute arbitrary code via vectors involving exception timing and a large number of string values, aka an "atom map" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0057</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0057" source="CVE"/>
	<description>
	Use-after-free vulnerability in the Web Workers implementation in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to execute arbitrary code via vectors related to a JavaScript Worker and garbage collection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0058</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0058" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0058" source="CVE"/>
	<description>
	Buffer overflow in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a long string that triggers construction of a long text run.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0059</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0059" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0059" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in Mozilla Firefox before 3.5.17 and 3.6.x before 3.6.14, and SeaMonkey before 2.0.12, allows remote attackers to hijack the authentication of arbitrary users for requests that were initiated by a plugin and received a 307 redirect to a page on a different web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0061</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0061" source="CVE"/>
	<description>
	Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0062</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0062" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.6.x before 3.6.14 and Thunderbird 3.1.x before 3.1.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 995cc8dae1f0571f2923cbf86e5c953f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067084" comment="MozillaFirefox less than 3.6.16-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067085" comment="mozilla-xulrunner192-32bit less than 1.9.2.16-1.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067086" comment="mozilla-xulrunner192 less than 1.9.2.16-1.5.1"/>
		</criteria>
	</criteria>
	<!-- cfadc4cf4463fa5757c18ebbf948c1f7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066217" comment="MozillaFirefox-translations less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066218" comment="MozillaFirefox less than 3.6.15-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066219" comment="mozilla-xulrunner192-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066220" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066221" comment="mozilla-xulrunner192-gnome less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066222" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066223" comment="mozilla-xulrunner192-translations less than 1.9.2.15-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066224" comment="mozilla-xulrunner192 less than 1.9.2.15-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066225" comment="MozillaFirefox-branding-upstream less than 3.6.15-0.6.1"/>
		</criteria></criteria>
	<!-- dfc1c9be3c028f9bbbf92255dc104ab5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066124" comment="mozilla-xulrunner191-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066125" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066126" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066127" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066128" comment="mozilla-xulrunner191-translations less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066129" comment="mozilla-xulrunner191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066130" comment="mozilla-xulrunner191-devel less than 1.9.1.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066131" comment="python-xpcom191 less than 1.9.1.17-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0065</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0065" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mChannel.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0066</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0066" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, allows remote attackers to execute arbitrary code via vectors related to OBJECT's mObserverList.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0067</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0067" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly implement autocompletion for forms, which allows remote attackers to read form history entries via a Java applet that spoofs interaction with the autocomplete controls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0069</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0069" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0070.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0070</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0070" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0070" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19, 3.6.x before 3.6.17, and 4.x before 4.0.1; Thunderbird before 3.1.10; and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0069.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0071</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0071" source="CVE"/>
	<description>
	Directory traversal vulnerability in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 on Windows allows remote attackers to determine the existence of arbitrary files, and possibly load resources, via vectors involving a resource: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0072</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0072" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0073</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0073" source="CVE"/>
	<description>
	Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, does not properly use nsTreeRange data structures, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0074</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0074" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0075</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0075" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0077, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0076</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0076" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Embedding Plugin (JEP) in Mozilla Firefox before 3.5.19 and 3.6.x before 3.6.17, and SeaMonkey before 2.0.14, on Mac OS X allows remote attackers to bypass intended access restrictions via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0077</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0077" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0078.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0078</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0078" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0072, CVE-2011-0074, CVE-2011-0075, and CVE-2011-0077.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0080</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0080" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0081</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0081" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.17 and 4.x before 4.0.1, and Thunderbird 3.1.x before 3.1.10, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0083</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0083" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsSVGPathSegList::ReplaceItem function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0084</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0084" source="CVE"/>
	<description>
	The SVGTextElement.getCharNumAtPosition function in Mozilla Firefox before 3.6.20, and 4.x through 5; Thunderbird 3.x before 3.1.12 and other versions before 6; SeaMonkey 2.x before 2.3; and possibly other products does not properly handle SVG text, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to a "dangling pointer."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24df2ef0dad5f3b46261e6f99333badf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
	<!-- b2e45f3a2377c8c0b0d85d6e8dc698c3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0085</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0085" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsXULCommandDispatcher function in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via a crafted XUL document that dequeues the current command updater.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0188</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0188" source="CVE"/>
	<description>
	The VpMemAlloc function in bigdecimal.c in the BigDecimal class in Ruby 1.9.2-p136 and earlier, as used on Apple Mac OS X before 10.6.7 and other platforms, does not properly allocate memory, which allows context-dependent attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving creation of a large BigDecimal value within a 64-bit process, related to an "integer truncation issue."
	</description>
 </metadata>
<!-- 4fc06fa0fbc01d40c9f9d34ee5ab3872 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068636" comment="ruby-devel less than 1.8.6.p369-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068637" comment="ruby-doc-html less than 1.8.6.p369-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068638" comment="ruby-doc-ri less than 1.8.6.p369-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068639" comment="ruby-examples less than 1.8.6.p369-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068640" comment="ruby-test-suite less than 1.8.6.p369-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068641" comment="ruby-tk less than 1.8.6.p369-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068635" comment="ruby less than 1.8.6.p369-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0191</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0191" source="CVE"/>
	<description>
	Buffer overflow in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF image with JPEG encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5f984c45fd590a060e94e0d63e5e2fae -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068149" comment="libtiff-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068153" comment="libtiff-x86 less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e83c81b75f211f34776c0dc71a91be08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066571" comment="libtiff-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066574" comment="libtiff-64bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066575" comment="libtiff-devel-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066576" comment="libtiff-devel-64bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066572" comment="libtiff-devel less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066577" comment="libtiff-x86 less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066573" comment="libtiff less than 3.8.2-5.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066571" comment="libtiff-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066575" comment="libtiff-devel-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066572" comment="libtiff-devel less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066573" comment="libtiff less than 3.8.2-5.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066575" comment="libtiff-devel-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066576" comment="libtiff-devel-64bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066572" comment="libtiff-devel less than 3.8.2-5.20.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0192</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0192" source="CVE"/>
	<description>
	Buffer overflow in Fax4Decode in LibTIFF 3.9.4 and possibly other versions, as used in ImageIO in Apple iTunes before 10.2 on Windows and other products, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted TIFF Internet Fax image file that has been compressed using CCITT Group 4 encoding, related to the EXPAND2D macro in libtiff/tif_fax3.h.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5f984c45fd590a060e94e0d63e5e2fae -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068149" comment="libtiff-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068153" comment="libtiff-x86 less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e83c81b75f211f34776c0dc71a91be08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066571" comment="libtiff-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066574" comment="libtiff-64bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066575" comment="libtiff-devel-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066576" comment="libtiff-devel-64bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066572" comment="libtiff-devel less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066577" comment="libtiff-x86 less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066573" comment="libtiff less than 3.8.2-5.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066571" comment="libtiff-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066575" comment="libtiff-devel-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066572" comment="libtiff-devel less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066573" comment="libtiff less than 3.8.2-5.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066575" comment="libtiff-devel-32bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066576" comment="libtiff-devel-64bit less than 3.8.2-5.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066572" comment="libtiff-devel less than 3.8.2-5.20.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0311</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0311" source="CVE"/>
	<description>
	The class file parser in IBM Java before 1.4.2 SR13 FP9, as used in IBM Runtimes for Java Technology 5.0.0 before SR13 and 6.0.0 before SR10, allows remote authenticated users to cause a denial of service (JVM segmentation fault, and possibly memory consumption or an infinite loop) via a crafted attribute length field in a class file, which triggers a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 413613008f7c01327ba129104bc4bcf8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
		</criteria>
	</criteria>
	<!-- d25bbf65a6a2b3926117126bf2da1942 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066666" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066657" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066662" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066663" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066655" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066656" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066659" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066660" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066661" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066665" comment="java-1_5_0-ibm less than 1.5.0_sr12.4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- f2840dfbdf46b26524b6c6fd9ca43c9c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068469" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068470" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068468" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068471" comment="java-1_4_2-ibm less than 1.4.2_sr13.9-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0411</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0411" source="CVE"/>
	<description>
	The STARTTLS implementation in Postfix 2.4.x before 2.4.16, 2.5.x before 2.5.12, 2.6.x before 2.6.9, and 2.7.x before 2.7.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted SMTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c9fe36c802a5270612a9ccb5004f53e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067842" comment="postfix less than 2.5.6-4.10.1"/>
	</criteria>
	<!-- 8cfe8f8a5b613c4f1f6e145a2991f5a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104389" comment="postfix less than 2.2.9-10.30"/>
	</criteria>
	<!-- cc7d763cf50fac0ab5c407bd7cb07be8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067842" comment="postfix less than 2.5.6-4.10.1"/>
	</criteria>
	<!-- d2a73b3e7036c18642e89f7abdac5ca6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068586" comment="pure-ftpd less than 1.0.22-0.20.1"/>
	</criteria>
	<!-- fb44818690c83f61834edde0d208cdae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068586" comment="pure-ftpd less than 1.0.22-0.20.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0419</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0419" source="CVE"/>
	<description>
	Stack consumption vulnerability in the fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library before 1.4.3 and the Apache HTTP Server before 2.2.18, and in fnmatch.c in libc in NetBSD 5.1, OpenBSD 4.8, FreeBSD, Apple Mac OS X 10.6, Oracle Solaris 10, and Android, allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via *? sequences in the first argument, as demonstrated by attacks against mod_autoindex in httpd.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 93f3f0fb2aeae6252ba07a3f17184bb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104365" comment="apache2-devel less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104366" comment="apache2-doc less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104367" comment="apache2-example-pages less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104368" comment="apache2-prefork less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104369" comment="apache2-worker less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104370" comment="apache2 less than 2.2.3-16.32.37.1"/>
		</criteria>
	</criteria>
	<!-- e1ffd94f36abf790103d5231ed8ed303 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069411" comment="libapr-util1-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069412" comment="libapr-util1-devel-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069414" comment="libapr-util1 less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069415" comment="libapr1-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069414" comment="libapr-util1 less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069412" comment="libapr-util1-devel-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebd69d25a128907e6d3b301dacc77ae2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069415" comment="libapr1-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0421</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0421" source="CVE"/>
	<description>
	The _zip_name_locate function in zip_name_locate.c in the Zip extension in PHP before 5.3.6 does not properly handle a ZIPARCHIVE::FL_UNCHANGED argument, which might allow context-dependent attackers to cause a denial of service (NULL pointer dereference) via an empty ZIP archive that is processed with a (1) locateName or (2) statName operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0433</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0433" source="CVE"/>
	<description>
	Heap-based buffer overflow in the linetoken function in afmparse.c in t1lib, as used in teTeX 3.0.x, GNOME evince, and possibly other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a DVI file containing a crafted Adobe Font Metrics (AFM) file, a different vulnerability than CVE-2010-2642.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- e02f6c15798de8da949815cde437fe14 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066923" comment="evince less than 0.4.0-25.15.1"/>
	</criteria>
	<!-- fa73688f39de24675aab1921c2e9025d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067152" comment="evince less than 0.4.0-25.19.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0444</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0444" source="CVE"/>
	<description>
	Buffer overflow in the MAC-LTE dissector (epan/dissectors/packet-mac-lte.c) in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large number of RARs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0445</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0445" source="CVE"/>
	<description>
	The ASN.1 BER dissector in Wireshark 1.4.0 through 1.4.2 allows remote attackers to cause a denial of service (assertion failure) via crafted packets, as demonstrated by fuzz-2010-12-30-28473.pcap.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0465</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0465" source="CVE"/>
	<description>
	xrdb.c in xrdb before 1.0.9 in X.Org X11R7.6 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a (1) DHCP or (2) XDMCP message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9da1a7f6e945e13e8a5509aea27d4098 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067153" comment="xorg-x11-Xnest less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067154" comment="xorg-x11-Xvfb less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067155" comment="xorg-x11-Xvnc less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067156" comment="xorg-x11-devel-32bit less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067169" comment="xorg-x11-devel-64bit less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067157" comment="xorg-x11-devel less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067170" comment="xorg-x11-doc less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067158" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067159" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067160" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067161" comment="xorg-x11-fonts-scalable less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067162" comment="xorg-x11-fonts-syriac less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067163" comment="xorg-x11-libs-32bit less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067171" comment="xorg-x11-libs-64bit less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067172" comment="xorg-x11-libs-x86 less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067164" comment="xorg-x11-libs less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067165" comment="xorg-x11-man less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067173" comment="xorg-x11-sdk less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067166" comment="xorg-x11-server-glx less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067167" comment="xorg-x11-server less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067168" comment="xorg-x11 less than 6.9.0-50.74.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067154" comment="xorg-x11-Xvfb less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067170" comment="xorg-x11-doc less than 6.9.0-50.74.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067173" comment="xorg-x11-sdk less than 6.9.0-50.74.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c6a968fae1d6d604a09a3dbed49a4a93 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067174" comment="xorg-x11-Xnest less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067175" comment="xorg-x11-Xvfb less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067176" comment="xorg-x11-Xvnc less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067177" comment="xorg-x11-devel-32bit less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067190" comment="xorg-x11-devel-64bit less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067178" comment="xorg-x11-devel less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067191" comment="xorg-x11-doc less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067179" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067180" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067181" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067182" comment="xorg-x11-fonts-scalable less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067183" comment="xorg-x11-fonts-syriac less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067184" comment="xorg-x11-libs-32bit less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067192" comment="xorg-x11-libs-64bit less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067193" comment="xorg-x11-libs-x86 less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067185" comment="xorg-x11-libs less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067186" comment="xorg-x11-man less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067194" comment="xorg-x11-sdk less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067187" comment="xorg-x11-server-glx less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067188" comment="xorg-x11-server less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067189" comment="xorg-x11 less than 6.9.0-50.69.69.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067174" comment="xorg-x11-Xnest less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067175" comment="xorg-x11-Xvfb less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067176" comment="xorg-x11-Xvnc less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067177" comment="xorg-x11-devel-32bit less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067178" comment="xorg-x11-devel less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067191" comment="xorg-x11-doc less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067179" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067180" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067181" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067182" comment="xorg-x11-fonts-scalable less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067183" comment="xorg-x11-fonts-syriac less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067184" comment="xorg-x11-libs-32bit less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067185" comment="xorg-x11-libs less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067186" comment="xorg-x11-man less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067194" comment="xorg-x11-sdk less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067187" comment="xorg-x11-server-glx less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067188" comment="xorg-x11-server less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067189" comment="xorg-x11 less than 6.9.0-50.69.69.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067175" comment="xorg-x11-Xvfb less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067191" comment="xorg-x11-doc less than 6.9.0-50.69.69.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067194" comment="xorg-x11-sdk less than 6.9.0-50.69.69.9"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0521</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0521" source="CVE"/>
	<description>
	The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0530</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0530" source="CVE"/>
	<description>
	Buffer overflow in the mainloop function in nbd-server.c in the server in Network Block Device (nbd) before 2.9.20 might allow remote attackers to execute arbitrary code via a long request.  NOTE: this issue exists because of a CVE-2005-3534 regression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 044e3ac982660af3e0782939b4256c15 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067271" comment="nbd less than 2.9.20-0.7.1"/>
	</criteria>
	<!-- 16a2ab35a8c2c440ef6b0d9d7eeeffe7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067271" comment="nbd less than 2.9.20-0.7.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0534</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0534" source="CVE"/>
	<description>
	Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.
	</description>
 </metadata>
<!-- 83e045a5ff545cd914da5e807340feb0 -->
<criteria operator="AND">
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
	</criteria>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009065949" comment="tomcat5-admin-webapps less than 5.5.27-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065950" comment="tomcat5-webapps less than 5.5.27-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009065951" comment="tomcat5 less than 5.5.27-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0536</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0536" source="CVE"/>
	<description>
	Multiple untrusted search path vulnerabilities in elf/dl-object.c in certain modified versions of the GNU C Library (aka glibc or libc6), including glibc-2.5-49.el5_5.6 and glibc-2.12-1.7.el6_0.3 in Red Hat Enterprise Linux, allow local users to gain privileges via a crafted dynamic shared object (DSO) in a subdirectory of the current working directory during execution of a (1) setuid or (2) setgid program that has $ORIGIN in (a) RPATH or (b) RUNPATH within the program itself or a referenced library. NOTE: this issue exists because of an incorrect fix for CVE-2010-3847.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 68c207e7b54adb6c64930931c6c86ce0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069178" comment="glibc-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069188" comment="glibc-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069179" comment="glibc-devel-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069189" comment="glibc-devel-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069180" comment="glibc-devel less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069182" comment="glibc-i18ndata less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069183" comment="glibc-info less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069184" comment="glibc-locale-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069190" comment="glibc-locale-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069191" comment="glibc-locale-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069185" comment="glibc-locale less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069196" comment="glibc-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069186" comment="glibc less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069187" comment="nscd less than 2.4-31.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069197" comment="glibc-dceext-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069198" comment="glibc-dceext-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069199" comment="glibc-dceext-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069200" comment="glibc-dceext less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 84f7fd02e045a9f69dfe59728bf8fbc3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069202" comment="glibc-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069204" comment="glibc-devel-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069210" comment="glibc-locale-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069211" comment="glibc-locale-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069217" comment="glibc-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069220" comment="glibc-dceext-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069221" comment="glibc-dceext-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069222" comment="glibc-dceext-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069223" comment="glibc-dceext less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0538</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0538" source="CVE"/>
	<description>
	Wireshark 1.2.0 through 1.2.14, 1.4.0 through 1.4.3, and 1.5.0 frees an uninitialized pointer during processing of a .pcap file in the pcap-ng format, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a malformed file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0541</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0541" source="CVE"/>
	<description>
	fuse 2.8.5 and earlier does not properly handle when /etc/mtab cannot be updated, which allows local users to unmount arbitrary directories via a symlink attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7b2fb9f684a28e8120a1bdce990ad5fe -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066714" comment="util-linux less than 2.12r-35.41.43.7"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066711" comment="fuse-devel less than 2.7.2-15.10.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066712" comment="fuse less than 2.7.2-15.10.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066713" comment="libfuse2 less than 2.7.2-15.10.11.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9844c158be14e3a6350b6dbf6348ca73 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067089" comment="fuse-devel less than 2.7.2-15.10.11.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067090" comment="fuse less than 2.7.2-15.10.11.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067091" comment="libfuse2 less than 2.7.2-15.10.11.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0543</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0543" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0543" source="CVE"/>
	<description>
	Certain legacy functionality in fusermount in fuse 2.8.5 and earlier, when util-linux does not support the --no-canonicalize option, allows local users to bypass intended access restrictions and unmount arbitrary directories via a symlink attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7b2fb9f684a28e8120a1bdce990ad5fe -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066714" comment="util-linux less than 2.12r-35.41.43.7"/>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066711" comment="fuse-devel less than 2.7.2-15.10.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066712" comment="fuse less than 2.7.2-15.10.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066713" comment="libfuse2 less than 2.7.2-15.10.11.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9844c158be14e3a6350b6dbf6348ca73 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009067089" comment="fuse-devel less than 2.7.2-15.10.11.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067090" comment="fuse less than 2.7.2-15.10.11.10"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067091" comment="libfuse2 less than 2.7.2-15.10.11.10"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0695</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-0695" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0695" source="CVE"/>
	<description>
	Race condition in the cm_work_handler function in the InfiniBand driver (drivers/infiniband/core/cma.c) in Linux kernel 2.6.x allows remote attackers to cause a denial of service (panic) by sending an InfiniBand request while other request handlers are still running, which triggers an invalid pointer dereference.
	</description>
 </metadata>
<!-- e928539d6bca959aca91d810ff33a425 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076279" comment="ofed-cxgb3-NIC-kmp-bigsmp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076280" comment="ofed-cxgb3-NIC-kmp-debug less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076281" comment="ofed-cxgb3-NIC-kmp-default less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076282" comment="ofed-cxgb3-NIC-kmp-kdump less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076283" comment="ofed-cxgb3-NIC-kmp-kdumppae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076284" comment="ofed-cxgb3-NIC-kmp-ppc64 less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076285" comment="ofed-cxgb3-NIC-kmp-smp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076286" comment="ofed-cxgb3-NIC-kmp-vmi less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076287" comment="ofed-cxgb3-NIC-kmp-vmipae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076288" comment="ofed-doc less than 1.5.2-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076289" comment="ofed-kmp-bigsmp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076290" comment="ofed-kmp-debug less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076291" comment="ofed-kmp-default less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076292" comment="ofed-kmp-kdump less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076293" comment="ofed-kmp-kdumppae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076294" comment="ofed-kmp-ppc64 less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076295" comment="ofed-kmp-smp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076296" comment="ofed-kmp-vmi less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076297" comment="ofed-kmp-vmipae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076298" comment="ofed less than 1.5.2-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076299" comment="ofed-devel less than 1.5.2-0.12.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0707</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0707" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Cgi/confirm.py in GNU Mailman 2.1.14 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) full name or (2) username field in a confirmation message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 01644f2af5cc2b20948d5777c1357c11 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068072" comment="mailman less than 2.1.7-15.8.1"/>
	</criteria>
	<!-- 9b0d6e7271e6e44245599a142886e7bb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068072" comment="mailman less than 2.1.7-15.8.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0708</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0708" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0708" source="CVE"/>
	<description>
	exif.c in the Exif extension in PHP before 5.3.6 on 64-bit platforms performs an incorrect cast, which allows remote attackers to cause a denial of service (application crash) via an image with a crafted Image File Directory (IFD) that triggers a buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0710</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0710" source="CVE"/>
	<description>
	The task_show_regs function in arch/s390/kernel/traps.c in the Linux kernel before 2.6.38-rc4-next-20110216 on the s390 platform allows local users to obtain the values of the registers of an arbitrary process by reading a status file under /proc/.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0711</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0711" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711" source="CVE"/>
	<description>
	The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2119b714456dc8c3d29661b68c7bee51 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4765b4a51c34eb13231f2a67011c8cfc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066491" comment="kernel-bigsmp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066493" comment="kernel-kdumppae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066485" comment="kernel-smp less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066494" comment="kernel-vmi less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066495" comment="kernel-vmipae less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066488" comment="kernel-xen less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066492" comment="kernel-xenpae less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 69931a7709e78d2b716e39859c3b56cb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
		</criteria>
	</criteria>
	<!-- cc92f236facf192053d5ac0bdb744a08 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066489" comment="kernel-debug less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
	<!-- cd9fb179a893a617ec3d3b82d167c2e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066484" comment="kernel-default less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066496" comment="kernel-iseries64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066497" comment="kernel-ppc64 less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066486" comment="kernel-source less than 2.6.16.60-0.77.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066487" comment="kernel-syms less than 2.6.16.60-0.77.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066490" comment="kernel-kdump less than 2.6.16.60-0.77.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0713</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0713" source="CVE"/>
	<description>
	Heap-based buffer overflow in wiretap/dct3trace.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a long record in a Nokia DCT3 trace file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0715</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0715" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0715" source="CVE"/>
	<description>
	The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.16, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request that contains a lock token.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 39703f93de4dd5819f6910aa7cad5e38 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069075" comment="cvs2svn less than 1.3.0-30.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069076" comment="subversion-devel less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069077" comment="subversion-python less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069078" comment="subversion-server less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069079" comment="subversion-tools less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069080" comment="subversion less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069081" comment="viewcvs less than 1.0.5-0.18.1"/>
		</criteria>
	</criteria>
	<!-- dc2a8d54fb644c1ef1dc261a23ba432e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069075" comment="cvs2svn less than 1.3.0-30.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069076" comment="subversion-devel less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069077" comment="subversion-python less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069078" comment="subversion-server less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069079" comment="subversion-tools less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069080" comment="subversion less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069081" comment="viewcvs less than 1.0.5-0.18.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0719</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0719" source="CVE"/>
	<description>
	Samba 3.x before 3.3.15, 3.4.x before 3.4.12, and 3.5.x before 3.5.7 does not perform range checks for file descriptors before use of the FD_SET macro, which allows remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening a large number of files, related to (1) Winbind or (2) smbd.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a9d4823514321163a350a4ea9d94fa4 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068166" comment="cifs-mount less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068167" comment="ldapsmb less than 1.34b-25.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068179" comment="libmsrpc-devel less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068180" comment="libmsrpc less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068168" comment="libsmbclient-32bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068181" comment="libsmbclient-64bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068169" comment="libsmbclient-devel less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068182" comment="libsmbclient-x86 less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068170" comment="libsmbclient less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068171" comment="samba-32bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068183" comment="samba-64bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068172" comment="samba-client-32bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068184" comment="samba-client-64bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068185" comment="samba-client-x86 less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068173" comment="samba-client less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068174" comment="samba-krb-printing less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068186" comment="samba-python less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068175" comment="samba-vscan less than 0.3.6b-43.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068176" comment="samba-winbind-32bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068187" comment="samba-winbind-64bit less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068188" comment="samba-winbind-x86 less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068177" comment="samba-winbind less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068189" comment="samba-x86 less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068178" comment="samba less than 3.0.36-0.13.14.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068179" comment="libmsrpc-devel less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068180" comment="libmsrpc less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068169" comment="libsmbclient-devel less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068190" comment="libsmbsharemodes-devel less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068191" comment="libsmbsharemodes less than 3.0.36-0.13.14.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068186" comment="samba-python less than 3.0.36-0.13.14.4"/>
			</criteria>
		</criteria></criteria>
	<!-- 7647f10c23183441620c089dfae68cd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104335" comment="cifs-mount less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104336" comment="libmsrpc-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104337" comment="libmsrpc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104338" comment="libsmbclient-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104339" comment="libsmbclient-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104340" comment="libsmbclient less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104341" comment="samba-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104342" comment="samba-client-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104343" comment="samba-client less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104344" comment="samba-doc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104345" comment="samba-krb-printing less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104346" comment="samba-python less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104347" comment="samba-vscan less than 0.3.6b-42.85.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104348" comment="samba-winbind-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104349" comment="samba-winbind less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104350" comment="samba less than 3.0.32-0.20.1"/>
		</criteria>
	</criteria>
	<!-- bf1425443d51e0c85ab0abb575ffd891 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068192" comment="cifs-mount less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068193" comment="ldapsmb less than 1.34b-25.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068205" comment="libmsrpc-devel less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068206" comment="libmsrpc less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068194" comment="libsmbclient-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068207" comment="libsmbclient-64bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068195" comment="libsmbclient-devel less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068208" comment="libsmbclient-x86 less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068196" comment="libsmbclient less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068197" comment="samba-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068209" comment="samba-64bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068198" comment="samba-client-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068210" comment="samba-client-64bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068211" comment="samba-client-x86 less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068199" comment="samba-client less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068200" comment="samba-krb-printing less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068212" comment="samba-python less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068201" comment="samba-vscan less than 0.3.6b-43.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068202" comment="samba-winbind-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068213" comment="samba-winbind-64bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068214" comment="samba-winbind-x86 less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068203" comment="samba-winbind less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068215" comment="samba-x86 less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068204" comment="samba less than 3.0.36-0.13.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068192" comment="cifs-mount less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068193" comment="ldapsmb less than 1.34b-25.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068205" comment="libmsrpc-devel less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068206" comment="libmsrpc less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068194" comment="libsmbclient-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068195" comment="libsmbclient-devel less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068196" comment="libsmbclient less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068197" comment="samba-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068198" comment="samba-client-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068199" comment="samba-client less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068200" comment="samba-krb-printing less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068212" comment="samba-python less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068201" comment="samba-vscan less than 0.3.6b-43.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068202" comment="samba-winbind-32bit less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068203" comment="samba-winbind less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068204" comment="samba less than 3.0.36-0.13.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068205" comment="libmsrpc-devel less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068206" comment="libmsrpc less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068195" comment="libsmbclient-devel less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068216" comment="libsmbsharemodes-devel less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068217" comment="libsmbsharemodes less than 3.0.36-0.13.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068212" comment="samba-python less than 3.0.36-0.13.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0726</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0726" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0726" source="CVE"/>
	<description>
	The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0752</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0752" source="CVE"/>
	<description>
	The extract function in PHP before 5.2.15 does not prevent use of the EXTR_OVERWRITE parameter to overwrite (1) the GLOBALS superglobal array and (2) the this variable, which allows context-dependent attackers to bypass intended access restrictions by modifying data structures that were not intended to depend on external input, a related issue to CVE-2005-2691 and CVE-2006-3758.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0753</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0753" source="CVE"/>
	<description>
	Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0755</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0755" source="CVE"/>
	<description>
	Integer overflow in the mt_rand function in PHP before 5.3.4 might make it easier for context-dependent attackers to predict the return values by leveraging a script's use of a large max parameter, as demonstrated by a value that exceeds mt_getrandmax.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6000ac28e71187f6e43124e3db159d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067121" comment="php5-json less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067102" comment="apache2-mod_php5 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067103" comment="php5-bcmath less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067104" comment="php5-bz2 less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067105" comment="php5-calendar less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067106" comment="php5-ctype less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067107" comment="php5-curl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067108" comment="php5-dba less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067109" comment="php5-dbase less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067110" comment="php5-devel less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067111" comment="php5-dom less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067112" comment="php5-exif less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067113" comment="php5-fastcgi less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067114" comment="php5-ftp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067115" comment="php5-gd less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067116" comment="php5-gettext less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067117" comment="php5-gmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067118" comment="php5-hash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067119" comment="php5-iconv less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067120" comment="php5-imap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067122" comment="php5-ldap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067123" comment="php5-mbstring less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067124" comment="php5-mcrypt less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067125" comment="php5-mhash less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067126" comment="php5-mysql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067127" comment="php5-ncurses less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067128" comment="php5-odbc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067129" comment="php5-openssl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067130" comment="php5-pcntl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067131" comment="php5-pdo less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067132" comment="php5-pear less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067133" comment="php5-pgsql less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067134" comment="php5-posix less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067135" comment="php5-pspell less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067136" comment="php5-shmop less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067137" comment="php5-snmp less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067138" comment="php5-soap less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067139" comment="php5-sockets less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067140" comment="php5-sqlite less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067141" comment="php5-suhosin less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067142" comment="php5-sysvmsg less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067143" comment="php5-sysvsem less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067144" comment="php5-sysvshm less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067151" comment="php5-tidy less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067145" comment="php5-tokenizer less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067146" comment="php5-wddx less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067147" comment="php5-xmlreader less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067148" comment="php5-xmlrpc less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067149" comment="php5-xsl less than 5.2.14-0.14.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067150" comment="php5-zlib less than 5.2.14-0.14.3"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f76596dfc8a2e20f280af9814fc09b5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066883" comment="php5-json less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066864" comment="apache2-mod_php5 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066865" comment="php5-bcmath less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066866" comment="php5-bz2 less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066867" comment="php5-calendar less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066868" comment="php5-ctype less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066869" comment="php5-curl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066870" comment="php5-dba less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066871" comment="php5-dbase less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066872" comment="php5-devel less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066873" comment="php5-dom less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066874" comment="php5-exif less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066875" comment="php5-fastcgi less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066876" comment="php5-ftp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066877" comment="php5-gd less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066878" comment="php5-gettext less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066879" comment="php5-gmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066880" comment="php5-hash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066881" comment="php5-iconv less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066882" comment="php5-imap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066884" comment="php5-ldap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066885" comment="php5-mbstring less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066886" comment="php5-mcrypt less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066887" comment="php5-mhash less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066888" comment="php5-mysql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066889" comment="php5-ncurses less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066890" comment="php5-odbc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066891" comment="php5-openssl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066892" comment="php5-pcntl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066893" comment="php5-pdo less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066894" comment="php5-pear less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066895" comment="php5-pgsql less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066896" comment="php5-posix less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066897" comment="php5-pspell less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066898" comment="php5-shmop less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066899" comment="php5-snmp less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066900" comment="php5-soap less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066901" comment="php5-sockets less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066902" comment="php5-sqlite less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066903" comment="php5-suhosin less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066904" comment="php5-sysvmsg less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066905" comment="php5-sysvsem less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066906" comment="php5-sysvshm less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066913" comment="php5-tidy less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066907" comment="php5-tokenizer less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066908" comment="php5-wddx less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066909" comment="php5-xmlreader less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066910" comment="php5-xmlrpc less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066911" comment="php5-xsl less than 5.2.14-0.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066912" comment="php5-zlib less than 5.2.14-0.14.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0762</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0762" source="CVE"/>
	<description>
	The vsf_filename_passes_filter function in ls.c in vsftpd before 2.3.3 allows remote authenticated users to cause a denial of service (CPU consumption and process slot exhaustion) via crafted glob expressions in STAT commands in multiple FTP sessions, a different vulnerability than CVE-2010-2632.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- b2a33a4c47a9d2ce055a95949ae8478c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068334" comment="vsftpd less than 2.0.4-19.18.222.20.1"/>
	</criteria>
	<!-- f03f3c31d6f915d3577f481386ace1f2 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068334" comment="vsftpd less than 2.0.4-19.18.222.20.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0764</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0764" source="CVE"/>
	<description>
	t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a crafted Type 1 font in a PDF document, as demonstrated by testz.2184122398.pdf.
	</description>
 </metadata>
<!-- 0a41b9d515732b420bea02ef6d7030a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074609" comment="t1lib-devel less than 1.3.1-585.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074608" comment="t1lib less than 1.3.1-585.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0786</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0786" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0786" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2011-0788.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0788</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0788" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2011-0786.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0802</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0802" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0814.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0814</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0814" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound, a different vulnerability than CVE-2011-0802.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0815</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0815" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0817</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0817" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0862</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0862" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allow remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0863</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0863" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0863" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0865</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0865" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0865" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Deserialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0866</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0866" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Java Runtime Environment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0867</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0867" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0868</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0868" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0869</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0869" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0869" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 26 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to SAAJ.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0871</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0871" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29 and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0872</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ia64</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0872" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier allows remote attackers to affect availability via unknown vectors related to NIO.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e5639ed751b5b652ed5c8efe956bf24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 6cfd6e9bc30d32ee33522d94ea427c79 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070126" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070127" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070125" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.10-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070128" comment="java-1_4_2-ibm less than 1.4.2_sr13.10-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0873</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
		<platform>sles10-sp3-java.i386</platform>
		<platform>sles10-sp3-java.ppc</platform>
		<platform>sles10-sp3-java.s390x</platform>
		<platform>sles10-sp3-java.x86_64</platform>
	</affected>
	<reference ref_id="CVE-2011-0873" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0873" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 25 and earlier, and 5.0 Update 29 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2937cbb354c6df7495e14d6572d00c23 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3f77af6299b12bd1d66ad30d1902f9d3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069455" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069456" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069457" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069458" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069459" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069460" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069461" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069462" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069463" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069464" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069465" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 9f362d0065fd135e7f4ae300527396e5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069680" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069681" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069682" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069683" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069684" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069685" comment="java-1_5_0-ibm-devel less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069686" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069687" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069688" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr12.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069689" comment="java-1_5_0-ibm less than 1.5.0_sr12.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a24675426b4665a2a4dc9290d8ff82f6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069466" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069467" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069468" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069469" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069470" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069471" comment="java-1_6_0-ibm-devel less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069472" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069473" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069474" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069475" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069476" comment="java-1_6_0-ibm less than 1.6.0_sr9.2-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0904</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0904" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0904" source="CVE"/>
	<description>
	The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when raw encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via a large (1) X position or (2) Y position value in a framebuffer update request that triggers an out-of-bounds memory access, related to the rfbTranslateNone and rfbSendRectEncodingRaw functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c4de84e7dfafc35895e428712078c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068743" comment="vino less than 2.12.0-25.25.1"/>
	</criteria>
	<!-- 86fea28ac43f9969768da38636a52da7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068743" comment="vino less than 2.12.0-25.25.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0905</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0905" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0905" source="CVE"/>
	<description>
	The rfbSendFramebufferUpdate function in server/libvncserver/rfbserver.c in vino-server in Vino 2.x before 2.28.3, 2.32.x before 2.32.2, 3.0.x before 3.0.2, and 3.1.x before 3.1.1, when tight encoding is used, allows remote authenticated users to cause a denial of service (daemon crash) via crafted dimensions in a framebuffer update request that triggers an out-of-bounds read operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c4de84e7dfafc35895e428712078c7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068743" comment="vino less than 2.12.0-25.25.1"/>
	</criteria>
	<!-- 86fea28ac43f9969768da38636a52da7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068743" comment="vino less than 2.12.0-25.25.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0988</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0988" source="CVE"/>
	<description>
	pure-ftpd 1.0.22, as used in SUSE Linux Enterprise Server 10 SP3 and SP4, and Enterprise Desktop 10 SP3 and SP4, when running OES Netware extensions, creates a world-writeable directory, which allows local users to overwrite arbitrary files and gain privileges via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 81ad240952ba82b9c9b969bf2557f3b5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066978" comment="pure-ftpd less than 1.0.22-0.18.1"/>
	</criteria>
	<!-- f2422396ff77739151af790963de5119 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066978" comment="pure-ftpd less than 1.0.22-0.18.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0996</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-0996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0996" source="CVE"/>
	<description>
	dhcpcd before 5.2.12 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3b6dd9003b534005a8f7f17b407b3594 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066982" comment="dhcpcd less than 1.3.22pl4-223.16.1"/>
	</criteria>
	<!-- cbaf66245e747871ebe8fb08642481cc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067061" comment="dhcpcd less than 1.3.22pl4-223.18.1"/>
	</criteria>
	<!-- cbfc4421954d5aa8c3aedcdc8830ebd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066982" comment="dhcpcd less than 1.3.22pl4-223.16.1"/>
	</criteria>
	<!-- d3583b928bec8a914136f8b82fc6941b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067061" comment="dhcpcd less than 1.3.22pl4-223.18.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20110997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-0997</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-0997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0997" source="CVE"/>
	<description>
	dhclient in ISC DHCP 3.0.x through 4.2.x before 4.2.1-P1, 3.1-ESV before 3.1-ESV-R1, and 4.1-ESV before 4.1-ESV-R2 allows remote attackers to execute arbitrary commands via shell metacharacters in a hostname obtained from a DHCP message, as demonstrated by a hostname that is provided to dhclient-script.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 07b241ab5b1ed67de8a226f24aecc235 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104390" comment="dhcp-client less than 3.0.7-7.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104391" comment="dhcp-devel less than 3.0.7-7.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104392" comment="dhcp-relay less than 3.0.7-7.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104393" comment="dhcp-server less than 3.0.7-7.4.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104394" comment="dhcp less than 3.0.7-7.4.3"/>
		</criteria>
	</criteria>
	<!-- 176253d3c0320c13a3b85f66c893baea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067261" comment="dhcp6 less than 1.0.11-0.13.9"/>
	</criteria>
	<!-- 4183a136af7dacc9faaa4f851610817d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104395" comment="dhcp6 less than 1.0.11-0.12.15"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104396" comment="dhcpcd less than 1.3.22pl4-223.15.20"/>
		</criteria>
	</criteria>
	<!-- 49e30b5fc96a8de8402b19e496a32083 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067195" comment="dhcp-client less than 3.0.7-7.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067197" comment="dhcp-devel less than 3.0.7-7.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067198" comment="dhcp-relay less than 3.0.7-7.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067199" comment="dhcp-server less than 3.0.7-7.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067196" comment="dhcp less than 3.0.7-7.13.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067197" comment="dhcp-devel less than 3.0.7-7.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067198" comment="dhcp-relay less than 3.0.7-7.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067199" comment="dhcp-server less than 3.0.7-7.13.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4ed099d9f6df2bf0c9e496bcf1242dc5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067200" comment="dhcp-client less than 3.0.7-7.7.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067202" comment="dhcp-devel less than 3.0.7-7.7.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067203" comment="dhcp-relay less than 3.0.7-7.7.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067204" comment="dhcp-server less than 3.0.7-7.7.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067201" comment="dhcp less than 3.0.7-7.7.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067202" comment="dhcp-devel less than 3.0.7-7.7.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067203" comment="dhcp-relay less than 3.0.7-7.7.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067204" comment="dhcp-server less than 3.0.7-7.7.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 5d9cd969b49998d4ccf19550c4a6aa18 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067261" comment="dhcp6 less than 1.0.11-0.13.9"/>
	</criteria>
	<!-- 8edda2612e20eccab45071844a6cd832 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067205" comment="dhcp-client less than 3.0.7-7.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067207" comment="dhcp-devel less than 3.0.7-7.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067208" comment="dhcp-relay less than 3.0.7-7.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067209" comment="dhcp-server less than 3.0.7-7.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067206" comment="dhcp less than 3.0.7-7.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009067207" comment="dhcp-devel less than 3.0.7-7.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067208" comment="dhcp-relay less than 3.0.7-7.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009067209" comment="dhcp-server less than 3.0.7-7.11.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1003</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1003" source="CVE"/>
	<description>
	Double free vulnerability in the vba_read_project_strings function in vba_extract.c in libclamav in ClamAV before 0.97 might allow remote attackers to execute arbitrary code via crafted Visual Basic for Applications (VBA) data in a Microsoft Office document.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0855e71261fc3d153a16bc229f2ba9ca -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066578" comment="clamav less than 0.97-5.5.3"/>
	</criteria>
	<!-- 8a5a9c6c43c51e5f621c9fa2d8c2d5dd -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066578" comment="clamav less than 0.97-5.5.3"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1010</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1010" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1010" source="CVE"/>
	<description>
	Buffer overflow in the mac_partition function in fs/partitions/mac.c in the Linux kernel before 2.6.37.2 allows local users to cause a denial of service (panic) or possibly have unspecified other impact via a malformed Mac OS partition table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1012</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1012" source="CVE"/>
	<description>
	The ldm_parse_vmdb function in fs/partitions/ldm.c in the Linux kernel before 2.6.38-rc6-git6 does not validate the VBLK size value in the VMDB structure in an LDM partition table, which allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted partition table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1015</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1015" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015" source="CVE"/>
	<description>
	The is_cgi method in CGIHTTPServer.py in the CGIHTTPServer module in Python 2.5, 2.6, and 3.0 allows remote attackers to read script source code via an HTTP GET request that lacks a / (slash) character at the beginning of the URI.
	</description>
 </metadata>
<!-- 8cae90c294b192a41f5e7816dbad3991 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073858" comment="python-32bit less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073865" comment="python-64bit less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073859" comment="python-curses less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073866" comment="python-demo less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073860" comment="python-devel less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073867" comment="python-doc-pdf less than 2.4.2-18.41.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073868" comment="python-doc less than 2.4.2-18.41.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073861" comment="python-gdbm less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073869" comment="python-idle less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073862" comment="python-tk less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073870" comment="python-x86 less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073863" comment="python-xml less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073864" comment="python less than 2.4.2-18.41.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073866" comment="python-demo less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073860" comment="python-devel less than 2.4.2-18.41.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073867" comment="python-doc-pdf less than 2.4.2-18.41.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073868" comment="python-doc less than 2.4.2-18.41.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073869" comment="python-idle less than 2.4.2-18.41.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1016</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1016" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1016" source="CVE"/>
	<description>
	The Radeon GPU drivers in the Linux kernel before 2.6.38-rc5 do not properly validate data related to the AA resolve registers, which allows local users to write to arbitrary memory locations associated with (1) Video RAM (aka VRAM) or (2) the Graphics Translation Table (GTT) via crafted values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1017</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1017" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1017" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel 2.6.37.2 and earlier might allow local users to gain privileges or obtain sensitive information via a crafted LDM partition table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1018</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1018" source="CVE"/>
	<description>
	logwatch.pl in Logwatch 7.3.6 allows remote attackers to execute arbitrary commands via shell metacharacters in a log file name, as demonstrated via a crafted username to a Samba server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5f4e5f7cf75ff35e065c49974df79c61 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009066667" comment="logwatch less than 7.3.1-4.11.1"/>
	</criteria>
	<!-- 92020ced8506d84dac2073842fb86cf6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009067212" comment="logwatch less than 7.3.1-4.13.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1044</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1044" source="CVE"/>
	<description>
	The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1071</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1071" source="CVE"/>
	<description>
	The GNU C Library (aka glibc or libc6) before 2.12.2 and Embedded GLIBC (EGLIBC) allow context-dependent attackers to execute arbitrary code or cause a denial of service (memory consumption) via a long UTF8 string that is used in an fnmatch call, aka a "stack extension attack," a related issue to CVE-2010-2898, CVE-2010-1917, and CVE-2007-4782, as originally reported for use of this library by Google Chrome.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 68c207e7b54adb6c64930931c6c86ce0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069178" comment="glibc-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069188" comment="glibc-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069179" comment="glibc-devel-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069189" comment="glibc-devel-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069180" comment="glibc-devel less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069182" comment="glibc-i18ndata less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069183" comment="glibc-info less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069184" comment="glibc-locale-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069190" comment="glibc-locale-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069191" comment="glibc-locale-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069185" comment="glibc-locale less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069196" comment="glibc-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069186" comment="glibc less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069187" comment="nscd less than 2.4-31.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069197" comment="glibc-dceext-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069198" comment="glibc-dceext-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069199" comment="glibc-dceext-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069200" comment="glibc-dceext less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 84f7fd02e045a9f69dfe59728bf8fbc3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069202" comment="glibc-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069204" comment="glibc-devel-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069210" comment="glibc-locale-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069211" comment="glibc-locale-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069217" comment="glibc-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069220" comment="glibc-dceext-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069221" comment="glibc-dceext-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069222" comment="glibc-dceext-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069223" comment="glibc-dceext less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1072</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1072" source="CVE"/>
	<description>
	The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519.
	</description>
 </metadata>
<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1080</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1080" source="CVE"/>
	<description>
	The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1089</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1089" source="CVE"/>
	<description>
	The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17c15337eaf4f28f28cdc9f9d3d731ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104319" comment="glibc-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104320" comment="glibc-devel-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104321" comment="glibc-devel less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104322" comment="glibc-html less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104323" comment="glibc-i18ndata less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104324" comment="glibc-info less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104325" comment="glibc-locale-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104326" comment="glibc-locale less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104327" comment="glibc-profile-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104328" comment="glibc-profile less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104329" comment="glibc less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104330" comment="nscd less than 2.4-31.77.102.1"/>
		</criteria>
	</criteria>
	<!-- 59ac9d98fb3fbdc8763728611b38962b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070265" comment="ncpfs less than 2.2.6-24.19.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
		</criteria></criteria>
	<!-- ae7b2bb12ddda522987dc10489bcbf1f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076031" comment="glibc-32bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076057" comment="glibc-64bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076032" comment="glibc-devel-32bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076058" comment="glibc-devel-64bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076033" comment="glibc-devel less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076034" comment="glibc-html less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076035" comment="glibc-i18ndata less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076036" comment="glibc-info less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076037" comment="glibc-locale-32bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076059" comment="glibc-locale-64bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076060" comment="glibc-locale-x86 less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076038" comment="glibc-locale less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076061" comment="glibc-profile-32bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076062" comment="glibc-profile-64bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076063" comment="glibc-profile-x86 less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076064" comment="glibc-profile less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076065" comment="glibc-x86 less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076039" comment="glibc less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076040" comment="nscd less than 2.4-31.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076066" comment="glibc-dceext-32bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076067" comment="glibc-dceext-64bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076068" comment="glibc-dceext-x86 less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076069" comment="glibc-dceext less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076034" comment="glibc-html less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076061" comment="glibc-profile-32bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076062" comment="glibc-profile-64bit less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076063" comment="glibc-profile-x86 less than 2.4-31.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076064" comment="glibc-profile less than 2.4-31.103.1"/>
			</criteria>
		</criteria></criteria>
	<!-- bf9e90522d98521f17af5aa03309ef73 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070265" comment="ncpfs less than 2.2.6-24.19.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1090</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1090" source="CVE"/>
	<description>
	The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1091</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1091" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1091" source="CVE"/>
	<description>
	libymsg.c in the Yahoo! protocol plugin in libpurple in Pidgin 2.6.0 through 2.7.10 allows (1) remote authenticated users to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG notification packet, and allows (2) remote Yahoo! servers to cause a denial of service (NULL pointer dereference and application crash) via a malformed YMSG SMS message.
	</description>
 </metadata>
<!-- c8785ba000be7d63668dde38be66bd5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072461" comment="finch-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072458" comment="finch less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072462" comment="libpurple-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072459" comment="libpurple less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072463" comment="pidgin-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072460" comment="pidgin less than 2.6.6-0.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1092</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1092" source="CVE"/>
	<description>
	Integer overflow in ext/shmop/shmop.c in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (crash) and possibly read sensitive memory via a large third argument to the shmop_read function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1093</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1093" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1093" source="CVE"/>
	<description>
	The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1095</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1095" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1095" source="CVE"/>
	<description>
	locale/programs/locale.c in locale in the GNU C Library (aka glibc or libc6) before 2.13 does not quote its output, which might allow local users to gain privileges via a crafted localization environment variable, in conjunction with a program that executes a script that uses the eval function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 68c207e7b54adb6c64930931c6c86ce0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069178" comment="glibc-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069188" comment="glibc-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069179" comment="glibc-devel-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069189" comment="glibc-devel-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069180" comment="glibc-devel less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069182" comment="glibc-i18ndata less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069183" comment="glibc-info less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069184" comment="glibc-locale-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069190" comment="glibc-locale-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069191" comment="glibc-locale-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069185" comment="glibc-locale less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069196" comment="glibc-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069186" comment="glibc less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069187" comment="nscd less than 2.4-31.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069197" comment="glibc-dceext-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069198" comment="glibc-dceext-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069199" comment="glibc-dceext-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069200" comment="glibc-dceext less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 84f7fd02e045a9f69dfe59728bf8fbc3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069202" comment="glibc-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069204" comment="glibc-devel-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069210" comment="glibc-locale-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069211" comment="glibc-locale-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069217" comment="glibc-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069220" comment="glibc-dceext-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069221" comment="glibc-dceext-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069222" comment="glibc-dceext-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069223" comment="glibc-dceext less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1098</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1098" source="CVE"/>
	<description>
	Race condition in the createOutputFile function in logrotate.c in logrotate 3.7.9 and earlier allows local users to read log data by opening a file before the intended permissions are in place.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8ceb2cef6a95329d60007c1dc82d703c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068588" comment="logrotate less than 3.7.3-13.13.3.1"/>
	</criteria>
	<!-- ed7eaabcf9dade3aaaf9d785ea90d56f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068589" comment="logrotate less than 3.7.3-13.15.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1138</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1138" source="CVE"/>
	<description>
	Off-by-one error in the dissect_6lowpan_iphc function in packet-6lowpan.c in Wireshark 1.4.0 through 1.4.3 on 32-bit platforms allows remote attackers to cause a denial of service (application crash) via a malformed 6LoWPAN IPv6 packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1139</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1139" source="CVE"/>
	<description>
	wiretap/pcapng.c in Wireshark 1.2.0 through 1.2.14 and 1.4.0 through 1.4.3 allows remote attackers to cause a denial of service (application crash) via a pcap-ng file that contains a large packet-length field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1140</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1140" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1140" source="CVE"/>
	<description>
	Multiple stack consumption vulnerabilities in the dissect_ms_compressed_string and dissect_mscldap_string functions in Wireshark 1.0.x, 1.2.0 through 1.2.14, and 1.4.0 through 1.4.3 allow remote attackers to cause a denial of service (infinite recursion) via a crafted (1) SMB or (2) Connection-less LDAP (CLDAP) packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1143</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1143" source="CVE"/>
	<description>
	epan/dissectors/packet-ntlmssp.c in the NTLMSSP dissector in Wireshark before 1.4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted .pcap file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6f945ca7e512591223a153602859503d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
	<!-- 7ca986d25c4d8a1552cc98ce1be7508b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066972" comment="wireshark less than 1.4.4-0.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009066973" comment="wireshark-devel less than 1.4.4-0.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1148</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1148" source="CVE"/>
	<description>
	Use-after-free vulnerability in the substr_replace function in PHP 5.3.6 and earlier allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by using the same variable for multiple arguments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1155</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1155" source="CVE"/>
	<description>
	The writeState function in logrotate.c in logrotate 3.7.9 and earlier might allow context-dependent attackers to cause a denial of service (rotation outage) via a (1) \n (newline) or (2) \ (backslash) character in a log filename, as demonstrated by a filename that is automatically constructed on the basis of a hostname or virtual machine name.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8ceb2cef6a95329d60007c1dc82d703c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068588" comment="logrotate less than 3.7.3-13.13.3.1"/>
	</criteria>
	<!-- ed7eaabcf9dade3aaaf9d785ea90d56f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068589" comment="logrotate less than 3.7.3-13.15.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1160</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1160" source="CVE"/>
	<description>
	The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1163</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1163" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163" source="CVE"/>
	<description>
	The osf_partition function in fs/partitions/osf.c in the Linux kernel before 2.6.38 does not properly handle an invalid number of partitions, which might allow local users to obtain potentially sensitive information from kernel heap memory via vectors related to partition-table parsing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1166</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166" source="CVE"/>
	<description>
	Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5ef372422148176da8490b56d8e57492 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069241" comment="xen-devel less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069242" comment="xen-doc-html less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069243" comment="xen-doc-pdf less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069244" comment="xen-doc-ps less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069245" comment="xen-kmp-bigsmp less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069254" comment="xen-kmp-debug less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069246" comment="xen-kmp-default less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069255" comment="xen-kmp-kdump less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069256" comment="xen-kmp-kdumppae less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069247" comment="xen-kmp-smp less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069257" comment="xen-kmp-vmi less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069258" comment="xen-kmp-vmipae less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069248" comment="xen-libs-32bit less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069249" comment="xen-libs less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069250" comment="xen-tools-domU less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069251" comment="xen-tools-ioemu less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069252" comment="xen-tools less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069253" comment="xen less than 3.2.3_17040_36-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069241" comment="xen-devel less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069254" comment="xen-kmp-debug less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069255" comment="xen-kmp-kdump less than 3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069248" comment="xen-libs-32bit less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069249" comment="xen-libs less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069251" comment="xen-tools-ioemu less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069252" comment="xen-tools less than 3.2.3_17040_36-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069253" comment="xen less than 3.2.3_17040_36-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8cb29b577c0a831bd5c0067789950f17 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070576" comment="xen-doc-html less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070577" comment="xen-doc-pdf less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070578" comment="xen-doc-ps less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070579" comment="xen-kmp-bigsmp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070581" comment="xen-kmp-default less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070583" comment="xen-kmp-kdumppae less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070584" comment="xen-kmp-smp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070585" comment="xen-kmp-vmi less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070586" comment="xen-kmp-vmipae less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070589" comment="xen-tools-domU less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070576" comment="xen-doc-html less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070577" comment="xen-doc-pdf less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070578" comment="xen-doc-ps less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070581" comment="xen-kmp-default less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070584" comment="xen-kmp-smp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070589" comment="xen-tools-domU less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1167</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1167" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1167" source="CVE"/>
	<description>
	Heap-based buffer overflow in the thunder (aka ThunderScan) decoder in tif_thunder.c in LibTIFF 3.9.4 and earlier allows remote attackers to execute arbitrary code via crafted THUNDER_2BITDELTAS data in a .tiff file that has an unexpected BitsPerSample value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5f984c45fd590a060e94e0d63e5e2fae -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068149" comment="libtiff-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068153" comment="libtiff-x86 less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 696f188004b4cf9239d43744fa02d72f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068149" comment="libtiff-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068153" comment="libtiff-x86 less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068148" comment="libtiff-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068154" comment="libtiff less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068150" comment="libtiff-devel-32bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068151" comment="libtiff-devel-64bit less than 3.8.2-5.24.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068152" comment="libtiff-devel less than 3.8.2-5.24.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1170</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1170" source="CVE"/>
	<description>
	net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1171</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1171" source="CVE"/>
	<description>
	net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1172</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1172" source="CVE"/>
	<description>
	net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1173</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1173" source="CVE"/>
	<description>
	The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.39 on the x86_64 platform allows remote attackers to obtain potentially sensitive information from kernel stack memory by reading uninitialized data in the ah field of an Acorn Universal Networking (AUN) packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1178</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1178" source="CVE"/>
	<description>
	Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PCX image that triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 013ac8ad5056f5e91f63b3f737b36cfc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068701" comment="gimp-devel less than 2.2.10-22.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068702" comment="gimp less than 2.2.10-22.38.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1180</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1180" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1182</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server RT Solution 10 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182" source="CVE"/>
	<description>
	kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1187</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1187" source="CVE"/>
	<description>
	Google Chrome before 10.0.648.127 allows remote attackers to bypass the Same Origin Policy via unspecified vectors, related to an "error message leak."
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1202</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202" source="CVE"/>
	<description>
	The xsltGenerateIdFunction function in functions.c in libxslt 1.1.26 and earlier, as used in Google Chrome before 10.0.648.127 and other products, allows remote attackers to obtain potentially sensitive information about heap memory addresses via an XML document containing a call to the XSLT generate-id XPath function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0339fef11552ec72ccc4787f7398a8df -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 0c73a3b88327cd1c299b76dee48f005e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 1c4d6c90b30479fe7e1798e4cd7623c7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068275" comment="MozillaFirefox-translations less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068276" comment="MozillaFirefox less than 3.6.17-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068277" comment="mozilla-xulrunner192-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068278" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068279" comment="mozilla-xulrunner192-gnome less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068280" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068281" comment="mozilla-xulrunner192-translations less than 1.9.2.17-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068282" comment="mozilla-xulrunner192 less than 1.9.2.17-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068283" comment="MozillaFirefox-branding-upstream less than 3.6.17-0.5.1"/>
		</criteria></criteria>
	<!-- 80f6910b2efb9db816cc045ed9550be7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068267" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068268" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068269" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068270" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068271" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068272" comment="mozilla-xulrunner191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068273" comment="mozilla-xulrunner191-devel less than 1.9.1.19-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068274" comment="python-xpcom191 less than 1.9.1.19-0.5.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1398</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1398" source="CVE"/>
	<description>
	The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- fc148b307277a068b432ffd08c765241 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075707" comment="apache2-mod_php5 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075708" comment="php5-bcmath less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075709" comment="php5-bz2 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075710" comment="php5-calendar less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075711" comment="php5-ctype less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075712" comment="php5-curl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075713" comment="php5-dba less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075714" comment="php5-dbase less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075715" comment="php5-devel less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075716" comment="php5-dom less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075717" comment="php5-exif less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075718" comment="php5-fastcgi less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075719" comment="php5-ftp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075720" comment="php5-gd less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075721" comment="php5-gettext less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075722" comment="php5-gmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075723" comment="php5-hash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075724" comment="php5-iconv less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075725" comment="php5-imap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075726" comment="php5-json less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075727" comment="php5-ldap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075728" comment="php5-mbstring less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075729" comment="php5-mcrypt less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075730" comment="php5-mhash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075731" comment="php5-mysql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075732" comment="php5-ncurses less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075733" comment="php5-odbc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075734" comment="php5-openssl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075735" comment="php5-pcntl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075736" comment="php5-pdo less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075737" comment="php5-pear less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075738" comment="php5-pgsql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075739" comment="php5-posix less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075740" comment="php5-pspell less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075741" comment="php5-shmop less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075742" comment="php5-snmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075743" comment="php5-soap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075744" comment="php5-sockets less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075745" comment="php5-sqlite less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075746" comment="php5-suhosin less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075747" comment="php5-sysvmsg less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075748" comment="php5-sysvsem less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075749" comment="php5-sysvshm less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075750" comment="php5-tokenizer less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075751" comment="php5-wddx less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075752" comment="php5-xmlreader less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075753" comment="php5-xmlrpc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075754" comment="php5-xsl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075755" comment="php5-zlib less than 5.2.14-0.40.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075707" comment="apache2-mod_php5 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075708" comment="php5-bcmath less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075709" comment="php5-bz2 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075710" comment="php5-calendar less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075711" comment="php5-ctype less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075712" comment="php5-curl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075713" comment="php5-dba less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075714" comment="php5-dbase less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075715" comment="php5-devel less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075716" comment="php5-dom less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075717" comment="php5-exif less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075718" comment="php5-fastcgi less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075719" comment="php5-ftp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075720" comment="php5-gd less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075721" comment="php5-gettext less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075722" comment="php5-gmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075723" comment="php5-hash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075724" comment="php5-iconv less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075725" comment="php5-imap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075727" comment="php5-ldap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075728" comment="php5-mbstring less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075729" comment="php5-mcrypt less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075730" comment="php5-mhash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075731" comment="php5-mysql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075732" comment="php5-ncurses less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075733" comment="php5-odbc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075734" comment="php5-openssl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075735" comment="php5-pcntl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075736" comment="php5-pdo less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075737" comment="php5-pear less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075738" comment="php5-pgsql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075739" comment="php5-posix less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075740" comment="php5-pspell less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075741" comment="php5-shmop less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075742" comment="php5-snmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075743" comment="php5-soap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075744" comment="php5-sockets less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075745" comment="php5-sqlite less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075746" comment="php5-suhosin less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075747" comment="php5-sysvmsg less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075748" comment="php5-sysvsem less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075749" comment="php5-sysvshm less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075756" comment="php5-tidy less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075750" comment="php5-tokenizer less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075751" comment="php5-wddx less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075752" comment="php5-xmlreader less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075753" comment="php5-xmlrpc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075754" comment="php5-xsl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075755" comment="php5-zlib less than 5.2.14-0.40.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1464</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1464" source="CVE"/>
	<description>
	Buffer overflow in the strval function in PHP before 5.3.6, when the precision configuration option has a large value, might allow context-dependent attackers to cause a denial of service (application crash) via a small numerical value in the argument.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1466</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1466" source="CVE"/>
	<description>
	Integer overflow in the SdnToJulian function in the Calendar extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a large integer in the first argument to the cal_from_jd function.
	</description>
 </metadata>
<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1467</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1467" source="CVE"/>
	<description>
	Unspecified vulnerability in the NumberFormatter::setSymbol (aka numfmt_set_symbol) function in the Intl extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via an invalid argument, a related issue to CVE-2010-4409.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1468</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1468" source="CVE"/>
	<description>
	Multiple memory leaks in the OpenSSL extension in PHP before 5.3.6 might allow remote attackers to cause a denial of service (memory consumption) via (1) plaintext data to the openssl_encrypt function or (2) ciphertext data to the openssl_decrypt function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1469</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1469" source="CVE"/>
	<description>
	Unspecified vulnerability in the Streams component in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) by accessing an ftp:// URL during use of an HTTP proxy with the FTP wrapper.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1470</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1470" source="CVE"/>
	<description>
	The Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (application crash) via a ziparchive stream that is not properly handled by the stream_get_contents function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1471</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1471" source="CVE"/>
	<description>
	Integer signedness error in zip_stream.c in the Zip extension in PHP before 5.3.6 allows context-dependent attackers to cause a denial of service (CPU consumption) via a malformed archive file that triggers errors in zip_fread function calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1473</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1473" source="CVE"/>
	<description>
	** DISPUTED ** OpenSSL before 0.9.8l, and 0.9.8m through 1.x, does not properly restrict client-initiated renegotiation within the SSL and TLS protocols, which might make it easier for remote attackers to cause a denial of service (CPU consumption) by performing many renegotiations within a single connection, a different vulnerability than CVE-2011-5094.  NOTE: it can also be argued that it is the responsibility of server deployments, not a security library, to prevent or limit renegotiation when it is inappropriate within a specific environment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- 9df41a2f243057be246685d2d329cdf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072233" comment="apache2-devel less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072234" comment="apache2-doc less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072235" comment="apache2-example-pages less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072236" comment="apache2-prefork less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072237" comment="apache2-worker less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072238" comment="apache2 less than 2.2.3-16.42.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1476</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1476" source="CVE"/>
	<description>
	Integer underflow in the Open Sound System (OSS) subsystem in the Linux kernel before 2.6.39 on unspecified non-x86 platforms allows local users to cause a denial of service (memory corruption) by leveraging write access to /dev/sequencer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1477</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1477" source="CVE"/>
	<description>
	Multiple array index errors in sound/oss/opl3.c in the Linux kernel before 2.6.39 allow local users to cause a denial of service (heap memory corruption) or possibly gain privileges by leveraging write access to /dev/sequencer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1487</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1487" source="CVE"/>
	<description>
	The (1) lc, (2) lcfirst, (3) uc, and (4) ucfirst functions in Perl 5.10.x, 5.11.x, and 5.12.x through 5.12.3, and 5.13.x through 5.13.11, do not apply the taint attribute to the return value upon processing tainted input, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2ef160cacdf31574bcf58d029805c6e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070816" comment="perl-32bit less than 5.8.8-14.19.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070817" comment="perl-64bit less than 5.8.8-14.19.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070818" comment="perl-x86 less than 5.8.8-14.19.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070819" comment="perl less than 5.8.8-14.19.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070816" comment="perl-32bit less than 5.8.8-14.19.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070819" comment="perl less than 5.8.8-14.19.7"/>
			</criteria>
		</criteria></criteria>
	<!-- bab9272216ee894902d1b59ef6fffb4e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070816" comment="perl-32bit less than 5.8.8-14.19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070817" comment="perl-64bit less than 5.8.8-14.19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070818" comment="perl-x86 less than 5.8.8-14.19.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070819" comment="perl less than 5.8.8-14.19.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1493</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1493" source="CVE"/>
	<description>
	Array index error in the rose_parse_national function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by composing FAC_NATIONAL_DIGIS data that specifies a large number of digipeaters, and then sending this data to a ROSE socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1494</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1494" source="CVE"/>
	<description>
	Integer overflow in the _ctl_do_mpt_command function in drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier might allow local users to gain privileges or cause a denial of service (memory corruption) via an ioctl call specifying a crafted value that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1495</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1495" source="CVE"/>
	<description>
	drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1521</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521" source="CVE"/>
	<description>
	The urllib and urllib2 modules in Python 2.x before 2.7.2 and 3.x before 3.2.1 process Location headers that specify redirection to file: URLs, which makes it easier for remote attackers to obtain sensitive information or cause a denial of service (resource consumption) via a crafted URL, as demonstrated by the file:///etc/passwd and file:///dev/zero URLs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 655f0de8e54f66cbae08d7b51b58f9c4 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068548" comment="python-32bit less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068555" comment="python-64bit less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068549" comment="python-curses less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068556" comment="python-demo less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068550" comment="python-devel less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068551" comment="python-gdbm less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068557" comment="python-idle less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068552" comment="python-tk less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068558" comment="python-x86 less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068553" comment="python-xml less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068554" comment="python less than 2.4.2-18.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068556" comment="python-demo less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068550" comment="python-devel less than 2.4.2-18.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068557" comment="python-idle less than 2.4.2-18.37.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 96c2e37d668811c74d95ac2bf8de4b90 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068559" comment="python-32bit less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068560" comment="python-64bit less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068561" comment="python-curses less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068562" comment="python-demo less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068563" comment="python-devel less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068564" comment="python-gdbm less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068565" comment="python-idle less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068566" comment="python-tk less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068567" comment="python-x86 less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068568" comment="python-xml less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068569" comment="python less than 2.4.2-18.34.33.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068559" comment="python-32bit less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068561" comment="python-curses less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068562" comment="python-demo less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068563" comment="python-devel less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068564" comment="python-gdbm less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068565" comment="python-idle less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068566" comment="python-tk less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068568" comment="python-xml less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068569" comment="python less than 2.4.2-18.34.33.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068562" comment="python-demo less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068563" comment="python-devel less than 2.4.2-18.34.33.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068565" comment="python-idle less than 2.4.2-18.34.33.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1523</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1523" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 836fa904c22a194904df8a12fdb82865 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069532" comment="nagios-www less than 2.6-13.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069533" comment="nagios less than 2.6-13.22.1"/>
		</criteria>
	</criteria>
	<!-- a78a9d64c1222ac4f4c1c5db66cd632b -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069532" comment="nagios-www less than 2.6-13.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069533" comment="nagios less than 2.6-13.22.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1526</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1526" source="CVE"/>
	<description>
	ftpd.c in the GSS-API FTP daemon in MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.1 and earlier does not check the krb5_setegid return value, which allows remote authenticated users to bypass intended group access restrictions, and create, overwrite, delete, or read files, via standard FTP commands, related to missing autoconf tests in a configure script.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1827558e7c86f395bb141c5095dca72d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072356" comment="krb5-32bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072361" comment="krb5-64bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072362" comment="krb5-apps-clients less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072363" comment="krb5-apps-servers less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072357" comment="krb5-client less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072358" comment="krb5-devel-32bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072364" comment="krb5-devel-64bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072359" comment="krb5-devel less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072365" comment="krb5-server less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072366" comment="krb5-x86 less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072360" comment="krb5 less than 1.4.3-19.49.49.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072362" comment="krb5-apps-clients less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072363" comment="krb5-apps-servers less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072365" comment="krb5-server less than 1.4.3-19.49.49.1"/>
			</criteria>
		</criteria></criteria>
	<!-- af1f89f792c1b454611bd0a8d2dd9462 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072356" comment="krb5-32bit less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072362" comment="krb5-apps-clients less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072363" comment="krb5-apps-servers less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072357" comment="krb5-client less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072358" comment="krb5-devel-32bit less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072359" comment="krb5-devel less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072365" comment="krb5-server less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072360" comment="krb5 less than 1.4.3-19.49.49.1"/>
		</criteria>
	</criteria>
	<!-- c6533e0368b2b223506fedc65580c4ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104351" comment="krb5-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104352" comment="krb5-apps-clients less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104353" comment="krb5-apps-servers less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104354" comment="krb5-client less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104355" comment="krb5-devel-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104356" comment="krb5-devel less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104357" comment="krb5-server less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104358" comment="krb5 less than 1.4.3-19.43.37.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1550" source="CVE"/>
	<description>
	The default configuration of logrotate on SUSE openSUSE Factory uses root privileges to process files in directories that permit non-root write access, which allows local users to conduct symlink and hard link attacks by leveraging logrotate's lack of support for untrusted directories, as demonstrated by directories for the (1) cobbler, (2) inn, (3) safte-monitor, and (4) uucp packages.
	</description>
 </metadata>
<!-- 887c4640300dc79be8b5abf4a6bbf908 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073171" comment="logrotate less than 3.7.3-13.17.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1552</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1552" source="CVE"/>
	<description>
	t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764.
	</description>
 </metadata>
<!-- 0a41b9d515732b420bea02ef6d7030a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074609" comment="t1lib-devel less than 1.3.1-585.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074608" comment="t1lib less than 1.3.1-585.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1553</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1553" source="CVE"/>
	<description>
	Use-after-free vulnerability in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764.
	</description>
 </metadata>
<!-- 0a41b9d515732b420bea02ef6d7030a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074609" comment="t1lib-devel less than 1.3.1-585.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074608" comment="t1lib less than 1.3.1-585.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1554</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1554" source="CVE"/>
	<description>
	Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764.
	</description>
 </metadata>
<!-- 0a41b9d515732b420bea02ef6d7030a1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074609" comment="t1lib-devel less than 1.3.1-585.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074608" comment="t1lib less than 1.3.1-585.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1573</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1573" source="CVE"/>
	<description>
	net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 026b38ec9a6f1f9490f7afc997212483 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8502f59680e80e98d2b9b45706072bfd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104381" comment="kernel-bigsmp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104385" comment="kernel-vmi less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104386" comment="kernel-vmipae less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104388" comment="kernel-xenpae less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 9015cd44aa348aab00e74d5003e94b6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104382" comment="kernel-debug less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104378" comment="kernel-default less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104383" comment="kernel-kdump less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104384" comment="kernel-smp less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104379" comment="kernel-source less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104380" comment="kernel-syms less than 2.6.16.60-0.42.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104387" comment="kernel-xen less than 2.6.16.60-0.42.11"/>
		</criteria>
	</criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1575</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1575" source="CVE"/>
	<description>
	The STARTTLS implementation in ftp_parser.c in Pure-FTPd before 1.0.30 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted FTP sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d2a73b3e7036c18642e89f7abdac5ca6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068586" comment="pure-ftpd less than 1.0.22-0.20.1"/>
	</criteria>
	<!-- fb44818690c83f61834edde0d208cdae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068586" comment="pure-ftpd less than 1.0.22-0.20.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1577</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577" source="CVE"/>
	<description>
	Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 169bd714365eb7c38e38540921171d06 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 6253a90635c740c154fb5e3cc64612f2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071616" comment="kernel-bigsmp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071621" comment="kernel-kdumppae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071622" comment="kernel-vmi less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071623" comment="kernel-vmipae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- b1201574824e860419470a1e97bdba2c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
		</criteria>
	</criteria>
	<!-- be6b41cc85222e68513448b61b7af786 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c4377326fa8f6c8c833ef411e531a291 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071624" comment="kernel-iseries64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071625" comment="kernel-ppc64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1585</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1585" source="CVE"/>
	<description>
	The cifs_find_smb_ses function in fs/cifs/connect.c in the Linux kernel before 2.6.36 does not properly determine the associations between users and sessions, which allows local users to bypass CIFS share authentication by leveraging a mount of a share by a different user.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 754d5abd3666eec2fbee9b225156757d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 937e57e402a3934a553aa1e31acd5203 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
		</criteria>
	</criteria>
	<!-- a2b86e88ca68bad088ef7137bd86a47d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068514" comment="kernel-iseries64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068516" comment="kernel-ppc64 less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
	<!-- c44206b33270f7a4715bc2a20553ccb8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070734" comment="kernel-bigsmp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070736" comment="kernel-kdumppae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070732" comment="kernel-smp less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070737" comment="kernel-vmi less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070738" comment="kernel-vmipae less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068515" comment="kernel-kdump less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070733" comment="kernel-xen less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070735" comment="kernel-xenpae less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebcb1b92f0fcbda4bb9c9cbf0cc086e1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068511" comment="kernel-default less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068512" comment="kernel-source less than 2.6.16.60-0.87.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068513" comment="kernel-syms less than 2.6.16.60-0.87.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068517" comment="kernel-debug less than 2.6.16.60-0.87.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1590</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1590" source="CVE"/>
	<description>
	The X.509if dissector in Wireshark 1.2.x before 1.2.16 and 1.4.x before 1.4.5 does not properly initialize certain global variables, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43c3ca69e3929285df4180de278a54f3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068728" comment="wireshark less than 1.4.4-0.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
		</criteria></criteria>
	<!-- f534d5de74308b703ae6a3dfc7ab80ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068728" comment="wireshark less than 1.4.4-0.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1591</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1591" source="CVE"/>
	<description>
	Stack-based buffer overflow in the DECT dissector in epan/dissectors/packet-dect.c in Wireshark 1.4.x before 1.4.5 allows remote attackers to execute arbitrary code via a crafted .pcap file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43c3ca69e3929285df4180de278a54f3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068728" comment="wireshark less than 1.4.4-0.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
		</criteria></criteria>
	<!-- f534d5de74308b703ae6a3dfc7ab80ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068728" comment="wireshark less than 1.4.4-0.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1592</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1592" source="CVE"/>
	<description>
	The NFS dissector in epan/dissectors/packet-nfs.c in Wireshark 1.4.x before 1.4.5 on Windows uses an incorrect integer data type during decoding of SETCLIENTID calls, which allows remote attackers to cause a denial of service (application crash) via a crafted .pcap file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 43c3ca69e3929285df4180de278a54f3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068728" comment="wireshark less than 1.4.4-0.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
		</criteria></criteria>
	<!-- f534d5de74308b703ae6a3dfc7ab80ed -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068728" comment="wireshark less than 1.4.4-0.39.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068729" comment="wireshark-devel less than 1.4.4-0.39.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1593</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593" source="CVE"/>
	<description>
	Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0385d2ed073fc66a850ce73c16c29d29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 2156573c3a8ca54a9f3a12aaa5e94fdc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2d2b831a90188575c5f6f48a7145b588 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
		</criteria>
	</criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 5fd532ca4daf2599f9c443a8dc010ade -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069267" comment="kernel-iseries64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069268" comment="kernel-ppc64 less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
		</criteria></criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e730666526d444d4f3bd71e10988453d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069269" comment="kernel-bigsmp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069261" comment="kernel-default less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069270" comment="kernel-kdumppae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069265" comment="kernel-smp less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069262" comment="kernel-source less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069263" comment="kernel-syms less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069271" comment="kernel-vmi less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069272" comment="kernel-vmipae less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069260" comment="kernel-debug less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069264" comment="kernel-kdump less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069266" comment="kernel-xen less than 2.6.16.60-0.79.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069273" comment="kernel-xenpae less than 2.6.16.60-0.79.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1595</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1595" source="CVE"/>
	<description>
	Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via a .. (dot dot) in a pathname.
	</description>
 </metadata>
<!-- 2262a27da0592e0919785b44e6113a30 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068571" comment="rdesktop less than 1.6.0-39.6.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1659</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1659" source="CVE"/>
	<description>
	Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 68c207e7b54adb6c64930931c6c86ce0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069178" comment="glibc-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069188" comment="glibc-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069179" comment="glibc-devel-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069189" comment="glibc-devel-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069180" comment="glibc-devel less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069182" comment="glibc-i18ndata less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069183" comment="glibc-info less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069184" comment="glibc-locale-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069190" comment="glibc-locale-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069191" comment="glibc-locale-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069185" comment="glibc-locale less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069196" comment="glibc-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069186" comment="glibc less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069187" comment="nscd less than 2.4-31.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069197" comment="glibc-dceext-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069198" comment="glibc-dceext-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069199" comment="glibc-dceext-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069200" comment="glibc-dceext less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069181" comment="glibc-html less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069192" comment="glibc-profile-32bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069193" comment="glibc-profile-64bit less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069194" comment="glibc-profile-x86 less than 2.4-31.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069195" comment="glibc-profile less than 2.4-31.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 84f7fd02e045a9f69dfe59728bf8fbc3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069202" comment="glibc-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069204" comment="glibc-devel-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069210" comment="glibc-locale-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069211" comment="glibc-locale-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069217" comment="glibc-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069201" comment="glibc-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069203" comment="glibc-devel-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069205" comment="glibc-devel less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069207" comment="glibc-i18ndata less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069208" comment="glibc-info less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069209" comment="glibc-locale-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069212" comment="glibc-locale less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069218" comment="glibc less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069219" comment="nscd less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069220" comment="glibc-dceext-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069221" comment="glibc-dceext-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069222" comment="glibc-dceext-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069223" comment="glibc-dceext less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069206" comment="glibc-html less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069213" comment="glibc-profile-32bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069214" comment="glibc-profile-64bit less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069215" comment="glibc-profile-x86 less than 2.4-31.77.84.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069216" comment="glibc-profile less than 2.4-31.77.84.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1679</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1679" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1679" source="CVE"/>
	<description>
	ncpfs 2.2.6 and earlier attempts to use (1) ncpmount to append to the /etc/mtab file and (2) ncpumount to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59ac9d98fb3fbdc8763728611b38962b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070265" comment="ncpfs less than 2.2.6-24.19.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
		</criteria></criteria>
	<!-- bf9e90522d98521f17af5aa03309ef73 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070265" comment="ncpfs less than 2.2.6-24.19.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1680</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1680" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1680" source="CVE"/>
	<description>
	ncpmount in ncpfs 2.2.6 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59ac9d98fb3fbdc8763728611b38962b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070265" comment="ncpfs less than 2.2.6-24.19.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
		</criteria></criteria>
	<!-- bf9e90522d98521f17af5aa03309ef73 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070265" comment="ncpfs less than 2.2.6-24.19.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070264" comment="ncpfs-devel less than 2.2.6-24.19.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1720</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1720" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1720" source="CVE"/>
	<description>
	The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8032d51c2874ebb7e39bf7812f87c084 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068353" comment="postfix less than 2.5.6-4.12.1"/>
	</criteria>
	<!-- 8cfe8f8a5b613c4f1f6e145a2991f5a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104389" comment="postfix less than 2.2.9-10.30"/>
	</criteria>
	<!-- 93ebd19621ea9372e38ef15b9edbef93 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068353" comment="postfix less than 2.5.6-4.12.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1745</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1745" source="CVE"/>
	<description>
	Integer overflow in the agp_generic_insert_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_BIND agp_ioctl ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 993ee225949ee9f544feb71629d70c87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
	<!-- 9d77aaa5fb708d72984de54bfeb12d2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104400" comment="kernel-bigsmp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104401" comment="kernel-debug less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104402" comment="kernel-kdump less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104403" comment="kernel-smp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104404" comment="kernel-vmi less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104405" comment="kernel-vmipae less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104406" comment="kernel-xen less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104407" comment="kernel-xenpae less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
	<!-- fd65159bd290e2fd65b2ca7ac8468b71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104401" comment="kernel-debug less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104402" comment="kernel-kdump less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104403" comment="kernel-smp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104406" comment="kernel-xen less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1746</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1746" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) agp_allocate_memory and (2) agp_create_user_memory functions in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 allow local users to trigger buffer overflows, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via vectors related to calls that specify a large number of memory pages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 993ee225949ee9f544feb71629d70c87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
	<!-- 9d77aaa5fb708d72984de54bfeb12d2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104400" comment="kernel-bigsmp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104401" comment="kernel-debug less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104402" comment="kernel-kdump less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104403" comment="kernel-smp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104404" comment="kernel-vmi less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104405" comment="kernel-vmipae less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104406" comment="kernel-xen less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104407" comment="kernel-xenpae less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
	<!-- fd65159bd290e2fd65b2ca7ac8468b71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104401" comment="kernel-debug less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104402" comment="kernel-kdump less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104403" comment="kernel-smp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104406" comment="kernel-xen less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1752</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1752" source="CVE"/>
	<description>
	The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.17, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a request for a baselined WebDAV resource, as exploited in the wild in May 2011.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 39703f93de4dd5819f6910aa7cad5e38 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069075" comment="cvs2svn less than 1.3.0-30.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069076" comment="subversion-devel less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069077" comment="subversion-python less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069078" comment="subversion-server less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069079" comment="subversion-tools less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069080" comment="subversion less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069081" comment="viewcvs less than 1.0.5-0.18.1"/>
		</criteria>
	</criteria>
	<!-- dc2a8d54fb644c1ef1dc261a23ba432e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069075" comment="cvs2svn less than 1.3.0-30.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069076" comment="subversion-devel less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069077" comment="subversion-python less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069078" comment="subversion-server less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069079" comment="subversion-tools less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069080" comment="subversion less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069081" comment="viewcvs less than 1.0.5-0.18.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1776</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1776" source="CVE"/>
	<description>
	The is_gpt_valid function in fs/partitions/efi.c in the Linux kernel before 2.6.39 does not check the size of an Extensible Firmware Interface (EFI) GUID Partition Table (GPT) entry, which allows physically proximate attackers to cause a denial of service (heap-based buffer overflow and OOPS) or obtain sensitive information from kernel heap memory by connecting a crafted GPT storage device, a different vulnerability than CVE-2011-1577.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 169bd714365eb7c38e38540921171d06 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 6253a90635c740c154fb5e3cc64612f2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071616" comment="kernel-bigsmp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071621" comment="kernel-kdumppae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071622" comment="kernel-vmi less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071623" comment="kernel-vmipae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
	<!-- b1201574824e860419470a1e97bdba2c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
		</criteria>
	</criteria>
	<!-- be6b41cc85222e68513448b61b7af786 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c4377326fa8f6c8c833ef411e531a291 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071624" comment="kernel-iseries64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071625" comment="kernel-ppc64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1782</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1782" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_channel_data function in file-psp.c in the Paint Shop Pro (PSP) plugin in GIMP 2.6.11 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a PSP_COMP_RLE (aka RLE compression) image file that begins a long run count at the end of the image.  NOTE: some of these details are obtained from third party information.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4543.
	</description>
 </metadata>
<!-- 013ac8ad5056f5e91f63b3f737b36cfc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009068701" comment="gimp-devel less than 2.2.10-22.38.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009068702" comment="gimp less than 2.2.10-22.38.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1783</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-1783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1783" source="CVE"/>
	<description>
	The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 39703f93de4dd5819f6910aa7cad5e38 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069075" comment="cvs2svn less than 1.3.0-30.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069076" comment="subversion-devel less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069077" comment="subversion-python less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069078" comment="subversion-server less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069079" comment="subversion-tools less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069080" comment="subversion less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069081" comment="viewcvs less than 1.0.5-0.18.1"/>
		</criteria>
	</criteria>
	<!-- dc2a8d54fb644c1ef1dc261a23ba432e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069075" comment="cvs2svn less than 1.3.0-30.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069076" comment="subversion-devel less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069077" comment="subversion-python less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069078" comment="subversion-server less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069079" comment="subversion-tools less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069080" comment="subversion less than 1.3.1-1.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069081" comment="viewcvs less than 1.0.5-0.18.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1910</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-1910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1910" source="CVE"/>
	<description>
	Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service (assertion failure and daemon exit) via a negative response containing large RRSIG RRsets.
	</description>
 </metadata>
<!-- a1d2052c172e9b480eca0dec27439b16 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068735" comment="bind-chrootenv less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068736" comment="bind-devel-64bit less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068737" comment="bind-devel less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068738" comment="bind-doc less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068732" comment="bind-libs-32bit less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068739" comment="bind-libs-64bit less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068740" comment="bind-libs-x86 less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068733" comment="bind-libs less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068734" comment="bind-utils less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068741" comment="bind less than 9.6ESVR4P1-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009068735" comment="bind-chrootenv less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068736" comment="bind-devel-64bit less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068737" comment="bind-devel less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068738" comment="bind-doc less than 9.6ESVR4P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009068741" comment="bind less than 9.6ESVR4P1-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1926</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1926" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1926" source="CVE"/>
	<description>
	The STARTTLS implementation in Cyrus IMAP Server before 2.4.7 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bacffc6c84228127d37692abcd8b937f -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069477" comment="cyrus-imapd-devel less than 2.2.12-27.16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069478" comment="cyrus-imapd less than 2.2.12-27.16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069479" comment="perl-Cyrus-IMAP less than 2.2.12-27.16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069480" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.16.28.1"/>
		</criteria>
	</criteria>
	<!-- f1d15bf2a14c05f79714937656c2d5af -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069485" comment="cyrus-imapd-devel less than 2.2.12-27.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069486" comment="cyrus-imapd less than 2.2.12-27.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069487" comment="perl-Cyrus-IMAP less than 2.2.12-27.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069488" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.18.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1928</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1928" source="CVE"/>
	<description>
	The fnmatch implementation in apr_fnmatch.c in the Apache Portable Runtime (APR) library 1.4.3 and 1.4.4, and the Apache HTTP Server 2.2.18, allows remote attackers to cause a denial of service (infinite loop) via a URI that does not match unspecified types of wildcard patterns, as demonstrated by attacks against mod_autoindex in httpd when a /*/WEB-INF/ configuration pattern is used.  NOTE: this issue exists because of an incorrect fix for CVE-2011-0419.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 93f3f0fb2aeae6252ba07a3f17184bb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104365" comment="apache2-devel less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104366" comment="apache2-doc less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104367" comment="apache2-example-pages less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104368" comment="apache2-prefork less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104369" comment="apache2-worker less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104370" comment="apache2 less than 2.2.3-16.32.37.1"/>
		</criteria>
	</criteria>
	<!-- e1ffd94f36abf790103d5231ed8ed303 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069411" comment="libapr-util1-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069412" comment="libapr-util1-devel-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069414" comment="libapr-util1 less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069415" comment="libapr1-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069414" comment="libapr-util1 less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069412" comment="libapr-util1-devel-64bit less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069413" comment="libapr-util1-devel less than 1.2.2-13.12.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ebd69d25a128907e6d3b301dacc77ae2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069415" comment="libapr1-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069418" comment="libapr1 less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069416" comment="libapr1-devel-64bit less than 1.2.2-13.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069417" comment="libapr1-devel less than 1.2.2-13.10.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1936</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1936" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1936" source="CVE"/>
	<description>
	Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8cb29b577c0a831bd5c0067789950f17 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070576" comment="xen-doc-html less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070577" comment="xen-doc-pdf less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070578" comment="xen-doc-ps less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070579" comment="xen-kmp-bigsmp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070581" comment="xen-kmp-default less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070583" comment="xen-kmp-kdumppae less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070584" comment="xen-kmp-smp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070585" comment="xen-kmp-vmi less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070586" comment="xen-kmp-vmipae less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070589" comment="xen-tools-domU less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070576" comment="xen-doc-html less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070577" comment="xen-doc-pdf less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070578" comment="xen-doc-ps less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070581" comment="xen-kmp-default less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070584" comment="xen-kmp-smp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070589" comment="xen-tools-domU less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ca3da7c0b116523580ed11bcec4992da -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070000" comment="xen-devel less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070001" comment="xen-doc-html less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070002" comment="xen-doc-pdf less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070003" comment="xen-doc-ps less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070004" comment="xen-kmp-bigsmp less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070013" comment="xen-kmp-debug less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070005" comment="xen-kmp-default less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070014" comment="xen-kmp-kdump less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070015" comment="xen-kmp-kdumppae less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070006" comment="xen-kmp-smp less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070016" comment="xen-kmp-vmi less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070017" comment="xen-kmp-vmipae less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070007" comment="xen-libs-32bit less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070008" comment="xen-libs less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070009" comment="xen-tools-domU less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070010" comment="xen-tools-ioemu less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070011" comment="xen-tools less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070012" comment="xen less than 3.2.3_17040_37-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070000" comment="xen-devel less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070013" comment="xen-kmp-debug less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070014" comment="xen-kmp-kdump less than 3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070007" comment="xen-libs-32bit less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070008" comment="xen-libs less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070010" comment="xen-tools-ioemu less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070011" comment="xen-tools less than 3.2.3_17040_37-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070012" comment="xen less than 3.2.3_17040_37-0.7.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1938</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938" source="CVE"/>
	<description>
	Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary code via a long pathname for a UNIX socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5ba2bb152dca1c1897387332356839 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
	<!-- dca91fce0b12de2ad4834a3073820a66 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068992" comment="php5-json less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068973" comment="apache2-mod_php5 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068974" comment="php5-bcmath less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068975" comment="php5-bz2 less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068976" comment="php5-calendar less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068977" comment="php5-ctype less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068978" comment="php5-curl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068979" comment="php5-dba less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068980" comment="php5-dbase less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068981" comment="php5-devel less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068982" comment="php5-dom less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068983" comment="php5-exif less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068984" comment="php5-fastcgi less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068985" comment="php5-ftp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068986" comment="php5-gd less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068987" comment="php5-gettext less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068988" comment="php5-gmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068989" comment="php5-hash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068990" comment="php5-iconv less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068991" comment="php5-imap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068993" comment="php5-ldap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068994" comment="php5-mbstring less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068995" comment="php5-mcrypt less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068996" comment="php5-mhash less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068997" comment="php5-mysql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068998" comment="php5-ncurses less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068999" comment="php5-odbc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069000" comment="php5-openssl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069001" comment="php5-pcntl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069002" comment="php5-pdo less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069003" comment="php5-pear less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069004" comment="php5-pgsql less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069005" comment="php5-posix less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069006" comment="php5-pspell less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069007" comment="php5-shmop less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069008" comment="php5-snmp less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069009" comment="php5-soap less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069010" comment="php5-sockets less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069011" comment="php5-sqlite less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069012" comment="php5-suhosin less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069013" comment="php5-sysvmsg less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069014" comment="php5-sysvsem less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069015" comment="php5-sysvshm less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069022" comment="php5-tidy less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069016" comment="php5-tokenizer less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069017" comment="php5-wddx less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069018" comment="php5-xmlreader less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069019" comment="php5-xmlrpc less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069020" comment="php5-xsl less than 5.2.14-0.16.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069021" comment="php5-zlib less than 5.2.14-0.16.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1944</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1944" source="CVE"/>
	<description>
	Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b31545830b7ea366985703ed45efeab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069546" comment="libxml2-32bit less than 2.6.23-15.25.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069550" comment="libxml2-64bit less than 2.6.23-15.25.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069547" comment="libxml2-devel-32bit less than 2.6.23-15.25.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069551" comment="libxml2-devel-64bit less than 2.6.23-15.25.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069548" comment="libxml2-devel less than 2.6.23-15.25.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069552" comment="libxml2-x86 less than 2.6.23-15.25.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069549" comment="libxml2 less than 2.6.23-15.25.5"/>
		</criteria>
	</criteria>
	<!-- c7c006264f519da11ca9ad24e60c6396 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069546" comment="libxml2-32bit less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069550" comment="libxml2-64bit less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069547" comment="libxml2-devel-32bit less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069551" comment="libxml2-devel-64bit less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069548" comment="libxml2-devel less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069552" comment="libxml2-x86 less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069549" comment="libxml2 less than 2.6.23-15.25.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069546" comment="libxml2-32bit less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069547" comment="libxml2-devel-32bit less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069548" comment="libxml2-devel less than 2.6.23-15.25.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069549" comment="libxml2 less than 2.6.23-15.25.5"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1945</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1945" source="CVE"/>
	<description>
	The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ae7a13289bf3aed07a6f4dc7f9dadb8b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068791" comment="openssl-32bit less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068792" comment="openssl-64bit less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068793" comment="openssl-devel-32bit less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068794" comment="openssl-devel-64bit less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068795" comment="openssl-devel less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068796" comment="openssl-doc less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068797" comment="openssl-x86 less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068798" comment="openssl less than 0.9.8a-18.45.47.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068791" comment="openssl-32bit less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068793" comment="openssl-devel-32bit less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068795" comment="openssl-devel less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068796" comment="openssl-doc less than 0.9.8a-18.45.47.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068798" comment="openssl less than 0.9.8a-18.45.47.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068796" comment="openssl-doc less than 0.9.8a-18.45.47.1"/>
		</criteria></criteria>
	<!-- bbe4d369b60c00c73158a28ea281339e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009068799" comment="openssl-32bit less than 0.9.8a-18.52.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068803" comment="openssl-64bit less than 0.9.8a-18.52.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068800" comment="openssl-devel-32bit less than 0.9.8a-18.52.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068804" comment="openssl-devel-64bit less than 0.9.8a-18.52.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068801" comment="openssl-devel less than 0.9.8a-18.52.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068805" comment="openssl-doc less than 0.9.8a-18.52.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068806" comment="openssl-x86 less than 0.9.8a-18.52.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068802" comment="openssl less than 0.9.8a-18.52.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009068805" comment="openssl-doc less than 0.9.8a-18.52.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1946</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1946" source="CVE"/>
	<description>
	gnomesu-pam-backend in libgnomesu 1.0.0 prints an error message but proceeds with the non-error code path upon failure of the setgid or setuid function, which allows local users to gain privileges by leveraging access to two unprivileged user accounts, and running many processes under one of these accounts.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- f58b5213506428cd72aa62f5d7e89774 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069096" comment="libgnomesu-devel less than 1.0.0-32.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069097" comment="libgnomesu less than 1.0.0-32.39.1"/>
		</criteria>
	</criteria>
	<!-- f834040fedb9834c4832328cbb1805a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069096" comment="libgnomesu-devel less than 1.0.0-32.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069097" comment="libgnomesu less than 1.0.0-32.39.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1957</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1957" source="CVE"/>
	<description>
	The dissect_dcm_main function in epan/dissectors/packet-dcm.c in the DICOM dissector in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (infinite loop) via an invalid PDU length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1958</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1958" source="CVE"/>
	<description>
	Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted Diameter dictionary file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20111959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-1959</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1959" source="CVE"/>
	<description>
	The snoop_read function in wiretap/snoop.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 does not properly handle certain virtualizable buffers, which allows remote attackers to cause a denial of service (application crash) via a large length value in a snoop file that triggers a stack-based buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2022</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2022" source="CVE"/>
	<description>
	The agp_generic_remove_memory function in drivers/char/agp/generic.c in the Linux kernel before 2.6.38.5 does not validate a certain start parameter, which allows local users to gain privileges or cause a denial of service (system crash) via a crafted AGPIOC_UNBIND agp_ioctl ioctl call, a different vulnerability than CVE-2011-1745.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 993ee225949ee9f544feb71629d70c87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
	<!-- 9d77aaa5fb708d72984de54bfeb12d2d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104400" comment="kernel-bigsmp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104401" comment="kernel-debug less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104402" comment="kernel-kdump less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104403" comment="kernel-smp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104404" comment="kernel-vmi less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104405" comment="kernel-vmipae less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104406" comment="kernel-xen less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104407" comment="kernel-xenpae less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
	<!-- fd65159bd290e2fd65b2ca7ac8468b71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104401" comment="kernel-debug less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104397" comment="kernel-default less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104402" comment="kernel-kdump less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104403" comment="kernel-smp less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104398" comment="kernel-source less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104399" comment="kernel-syms less than 2.6.16.60-0.42.54.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104406" comment="kernel-xen less than 2.6.16.60-0.42.54.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2174</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2174" source="CVE"/>
	<description>
	Double free vulnerability in the tvb_uncompress function in epan/tvbuff.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a packet with malformed data that uses zlib compression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2175</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2175" source="CVE"/>
	<description>
	Integer underflow in the visual_read function in wiretap/visual.c in Wireshark 1.2.x before 1.2.17 and 1.4.x before 1.4.7 allows remote attackers to cause a denial of service (application crash) via a malformed Visual Networks file that triggers a heap-based buffer over-read.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2182</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2182" source="CVE"/>
	<description>
	The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2199</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2199" source="CVE"/>
	<description>
	Buffer overflow in tftp-hpa before 5.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via the utimeout option.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ebe96a73d42ed584f1c5b6564a0ca107 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069331" comment="tftp less than 0.48-1.13.1"/>
	</criteria>
	<!-- fdfee5b5f1ff8b27be31443610ad008f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069331" comment="tftp less than 0.48-1.13.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2200</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2200" source="CVE"/>
	<description>
	The _dbus_header_byteswap function in dbus-marshal-header.c in D-Bus (aka DBus) 1.2.x before 1.2.28, 1.4.x before 1.4.12, and 1.5.x before 1.5.4 does not properly handle a non-native byte order, which allows local users to cause a denial of service (connection loss), obtain potentially sensitive information, or conduct unspecified state-modification attacks via crafted messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4cbe0c6627cb955ab78b36dc62989896 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069423" comment="dbus-1-32bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069428" comment="dbus-1-64bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069424" comment="dbus-1-devel less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069425" comment="dbus-1-glib-32bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069429" comment="dbus-1-glib-64bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069430" comment="dbus-1-glib-x86 less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069426" comment="dbus-1-glib less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069431" comment="dbus-1-x86 less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069427" comment="dbus-1 less than 0.60-33.31.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069424" comment="dbus-1-devel less than 0.60-33.31.1"/>
		</criteria></criteria>
	<!-- ab424d721f107ca0aae1f650a739466b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069423" comment="dbus-1-32bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069428" comment="dbus-1-64bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069424" comment="dbus-1-devel less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069425" comment="dbus-1-glib-32bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069429" comment="dbus-1-glib-64bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069430" comment="dbus-1-glib-x86 less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069426" comment="dbus-1-glib less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069431" comment="dbus-1-x86 less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069427" comment="dbus-1 less than 0.60-33.31.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069423" comment="dbus-1-32bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069424" comment="dbus-1-devel less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069425" comment="dbus-1-glib-32bit less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069426" comment="dbus-1-glib less than 0.60-33.31.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069427" comment="dbus-1 less than 0.60-33.31.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069424" comment="dbus-1-devel less than 0.60-33.31.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2202</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2202" source="CVE"/>
	<description>
	The rfc1867_post_handler function in main/rfc1867.c in PHP before 5.3.7 does not properly restrict filenames in multipart/form-data POST requests, which allows remote attackers to conduct absolute path traversal attacks, and possibly create or overwrite arbitrary files, via a crafted upload request, related to a "file path injection vulnerability."
	</description>
 </metadata>
<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2203</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2203" source="CVE"/>
	<description>
	The hfs_find_init function in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and Oops) by mounting an HFS file system with a malformed MDB extent record.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2204</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2204" source="CVE"/>
	<description>
	Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.17, when the MemoryUserDatabase is used, creates log entries containing passwords upon encountering errors in JMX user creation, which allows local users to obtain sensitive information by reading a log file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 157c381b5863119800aee5079e918ac9 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070174" comment="tomcat5-admin-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070175" comment="tomcat5-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070176" comment="tomcat5 less than 5.5.27-0.14.1"/>
		</criteria>
	</criteria>
	<!-- 751f5b6bd62ff252e0fe5e146292f7f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070174" comment="tomcat5-admin-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070175" comment="tomcat5-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070176" comment="tomcat5 less than 5.5.27-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2213</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213" source="CVE"/>
	<description>
	The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2362</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2362" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 do not distinguish between cookies for two domain names that differ only in a trailing dot, which allows remote web servers to bypass the Same Origin Policy via Set-Cookie headers.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2363</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2363" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsSVGPointList::AppendElement function in the implementation of SVG element lists in Mozilla Firefox before 3.6.18, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors involving a user-supplied callback.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2364</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2364" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2364" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2365.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2365</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2365" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox 3.6.x before 3.6.18 and Thunderbird before 3.1.11 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-2364.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2371</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2371" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2371" source="CVE"/>
	<description>
	Integer overflow in the Array.reduceRight method in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allows remote attackers to execute arbitrary code via vectors involving a long JavaScript Array object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2372</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2372" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10c4cb33ededc2c321d18a148b90acfb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- 8026ac2197f43942ee30e9d32864f793 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2373</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2373" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14, when JavaScript is disabled, allows remote attackers to execute arbitrary code via a crafted XUL document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2374</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2374" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, and Thunderbird before 3.1.11, allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2376</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2376" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.18 and Thunderbird before 3.1.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2377</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2377" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2377" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.18 and 4.x through 4.0.1, Thunderbird before 3.1.11, and SeaMonkey through 2.0.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a multipart/x-mixed-replace image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0637dceda217223a627a02ba83062213 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
	<!-- beb01b0576a3a5c29eab96698155939e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069301" comment="MozillaFirefox-translations less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069302" comment="MozillaFirefox less than 3.6.18-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069303" comment="mozilla-xulrunner192-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069304" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069305" comment="mozilla-xulrunner192-gnome less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069306" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069307" comment="mozilla-xulrunner192-translations less than 1.9.2.18-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069308" comment="mozilla-xulrunner192 less than 1.9.2.18-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069309" comment="MozillaFirefox-branding-upstream less than 3.6.18-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2378</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2378" source="CVE"/>
	<description>
	The appendChild function in Mozilla Firefox before 3.6.20, Thunderbird 3.x before 3.1.12, SeaMonkey 2.x, and possibly other products does not properly handle DOM objects, which allows remote attackers to execute arbitrary code via unspecified vectors that lead to dereferencing of a "dangling pointer."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24df2ef0dad5f3b46261e6f99333badf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
	<!-- b2e45f3a2377c8c0b0d85d6e8dc698c3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2464</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2464" source="CVE"/>
	<description>
	Unspecified vulnerability in ISC BIND 9 9.6.x before 9.6-ESV-R4-P3, 9.7.x before 9.7.3-P3, and 9.8.x before 9.8.0-P4 allows remote attackers to cause a denial of service (named daemon crash) via a crafted UPDATE request.
	</description>
 </metadata>
<!-- cc8a9e2229ae1bb06264ae88ecde9d78 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069390" comment="bind-chrootenv less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069391" comment="bind-devel-64bit less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069392" comment="bind-devel less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069393" comment="bind-doc less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069387" comment="bind-libs-32bit less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069394" comment="bind-libs-64bit less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069395" comment="bind-libs-x86 less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069388" comment="bind-libs less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069389" comment="bind-utils less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069396" comment="bind less than 9.6ESVR4P3-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069390" comment="bind-chrootenv less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069391" comment="bind-devel-64bit less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069392" comment="bind-devel less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069393" comment="bind-doc less than 9.6ESVR4P3-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069396" comment="bind less than 9.6ESVR4P3-0.7.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2483</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2483" source="CVE"/>
	<description>
	crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 102f27381fb2b4ef0cf39836a711b37f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070629" comment="yast2-core-devel less than 2.13.48-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070628" comment="yast2-core less than 2.13.48-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070629" comment="yast2-core-devel less than 2.13.48-0.8.1"/>
		</criteria></criteria>
	<!-- 8e9ceee14766a579acb89753eac6018f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069941" comment="glibc-32bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069956" comment="glibc-64bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069942" comment="glibc-devel-32bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069957" comment="glibc-devel-64bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069943" comment="glibc-devel less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069944" comment="glibc-html less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069945" comment="glibc-i18ndata less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069946" comment="glibc-info less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069947" comment="glibc-locale-32bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069958" comment="glibc-locale-64bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069959" comment="glibc-locale-x86 less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069948" comment="glibc-locale less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069960" comment="glibc-profile-32bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069961" comment="glibc-profile-64bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069962" comment="glibc-profile-x86 less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069963" comment="glibc-profile less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069964" comment="glibc-x86 less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069949" comment="glibc less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069950" comment="libxcrypt-32bit less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069965" comment="libxcrypt-64bit less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069966" comment="libxcrypt-devel less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069967" comment="libxcrypt-x86 less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069951" comment="libxcrypt less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069952" comment="nscd less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069953" comment="pam-modules-32bit less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069968" comment="pam-modules-64bit less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069969" comment="pam-modules-x86 less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069954" comment="pam-modules less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069970" comment="pwdutils-plugin-audit less than 3.0.7.1-17.36.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069955" comment="pwdutils less than 3.0.7.1-17.36.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069971" comment="glibc-dceext-32bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069972" comment="glibc-dceext-64bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069973" comment="glibc-dceext-x86 less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069974" comment="glibc-dceext less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069944" comment="glibc-html less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069960" comment="glibc-profile-32bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069961" comment="glibc-profile-64bit less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069962" comment="glibc-profile-x86 less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069963" comment="glibc-profile less than 2.4-31.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069966" comment="libxcrypt-devel less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069970" comment="pwdutils-plugin-audit less than 3.0.7.1-17.36.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 953879412f2611d0c50fcaee712c9779 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069975" comment="glibc-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069976" comment="glibc-64bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069977" comment="glibc-devel-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069978" comment="glibc-devel-64bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069979" comment="glibc-devel less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069980" comment="glibc-html less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069981" comment="glibc-i18ndata less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069982" comment="glibc-info less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069983" comment="glibc-locale-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069984" comment="glibc-locale-64bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069985" comment="glibc-locale-x86 less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069986" comment="glibc-locale less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069987" comment="glibc-profile-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069988" comment="glibc-profile-64bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069989" comment="glibc-profile-x86 less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069990" comment="glibc-profile less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069991" comment="glibc-x86 less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069992" comment="glibc less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069950" comment="libxcrypt-32bit less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069965" comment="libxcrypt-64bit less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069966" comment="libxcrypt-devel less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069967" comment="libxcrypt-x86 less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069951" comment="libxcrypt less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069993" comment="nscd less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069953" comment="pam-modules-32bit less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069968" comment="pam-modules-64bit less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069969" comment="pam-modules-x86 less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069954" comment="pam-modules less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069994" comment="pwdutils-plugin-audit less than 3.0.7.1-17.34.36.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069995" comment="pwdutils less than 3.0.7.1-17.34.36.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069975" comment="glibc-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069977" comment="glibc-devel-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069979" comment="glibc-devel less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069980" comment="glibc-html less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069981" comment="glibc-i18ndata less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069982" comment="glibc-info less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069983" comment="glibc-locale-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069986" comment="glibc-locale less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069987" comment="glibc-profile-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069990" comment="glibc-profile less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069992" comment="glibc less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069950" comment="libxcrypt-32bit less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069966" comment="libxcrypt-devel less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069951" comment="libxcrypt less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069993" comment="nscd less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069953" comment="pam-modules-32bit less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069954" comment="pam-modules less than 10-2.17.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069994" comment="pwdutils-plugin-audit less than 3.0.7.1-17.34.36.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069995" comment="pwdutils less than 3.0.7.1-17.34.36.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069996" comment="glibc-dceext-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069997" comment="glibc-dceext-64bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069998" comment="glibc-dceext-x86 less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069999" comment="glibc-dceext less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069980" comment="glibc-html less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069987" comment="glibc-profile-32bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069988" comment="glibc-profile-64bit less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069989" comment="glibc-profile-x86 less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069990" comment="glibc-profile less than 2.4-31.77.86.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069966" comment="libxcrypt-devel less than 2.4-12.9.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069994" comment="pwdutils-plugin-audit less than 3.0.7.1-17.34.36.3"/>
			</criteria>
		</criteria></criteria>
	<!-- ee84db0d1f4471abd4ab51536636eb1e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075807" comment="postgresql-libs-32bit less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075812" comment="postgresql-libs-64bit less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075813" comment="postgresql-libs-x86 less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075808" comment="postgresql-libs less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
			</criteria>
		</criteria></criteria>
	<!-- fad279bc7fe257d6d70f8790ae982079 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070630" comment="yast2-core-devel less than 2.13.48-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070631" comment="yast2-core less than 2.13.48-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070630" comment="yast2-core-devel less than 2.13.48-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2484</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2484" source="CVE"/>
	<description>
	The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2485</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2485" source="CVE"/>
	<description>
	The gdk_pixbuf__gif_image_load function in gdk-pixbuf/io-gif.c in gdk-pixbuf before 2.23.5 does not properly handle certain return values, which allows remote attackers to cause a denial of service (memory consumption) via a crafted GIF image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e4fac303fda249f28a90f89a7455837 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074864" comment="gdk-pixbuf-32bit less than 0.22.0-93.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074880" comment="gdk-pixbuf-64bit less than 0.22.0-93.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074881" comment="gdk-pixbuf-x86 less than 0.22.0-93.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074865" comment="gdk-pixbuf less than 0.22.0-93.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074882" comment="gdk-pixbuf-devel less than 0.22.0-93.9.1"/>
		</criteria></criteria>
	<!-- d761cd6e1a31389dc3a2d6c8c56cdbd3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074866" comment="gtk2-32bit less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074883" comment="gtk2-64bit less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074884" comment="gtk2-devel-64bit less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074867" comment="gtk2-devel less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074868" comment="gtk2-doc less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074885" comment="gtk2-x86 less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074869" comment="gtk2 less than 2.8.11-0.29.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2489</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2489" source="CVE"/>
	<description>
	Multiple off-by-one errors in opiesu.c in opiesu in OPIE 2.4.1-test1 and earlier might allow local users to gain privileges via a crafted command line.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 110d6753e7d666c27d06a5e164792db4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069591" comment="opie less than 2.4-567.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069592" comment="permissions less than 2011.6.28-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b88dcad7023c5cae0d2cfaacaf17a6b4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069591" comment="opie less than 2.4-567.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069592" comment="permissions less than 2011.6.28-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2490</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2490" source="CVE"/>
	<description>
	opielogin.c in opielogin in OPIE 2.4.1-test1 and earlier does not check the return value of the setuid system call, which allows local users to gain privileges by arranging for an account to already be running its maximum number of processes.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 110d6753e7d666c27d06a5e164792db4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069591" comment="opie less than 2.4-567.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069592" comment="permissions less than 2011.6.28-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b88dcad7023c5cae0d2cfaacaf17a6b4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069591" comment="opie less than 2.4-567.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069592" comment="permissions less than 2011.6.28-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2491</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491" source="CVE"/>
	<description>
	The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2492</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2492" source="CVE"/>
	<description>
	The bluetooth subsystem in the Linux kernel before 3.0-rc4 does not properly initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel memory via a crafted getsockopt system call, related to (1) the l2cap_sock_getsockopt_old function in net/bluetooth/l2cap_sock.c and (2) the rfcomm_sock_getsockopt_old function in net/bluetooth/rfcomm/sock.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2494</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2494" source="CVE"/>
	<description>
	kernel/taskstats.c in the Linux kernel before 3.1 allows local users to obtain sensitive I/O statistics by sending taskstats commands to a netlink socket, as demonstrated by discovering the length of another user's password.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2496</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2496" source="CVE"/>
	<description>
	Integer overflow in the vma_to_resize function in mm/mremap.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (BUG_ON and system crash) via a crafted mremap system call that expands a memory mapping.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0e9208ee65c884d152a545b8766938bc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069779" comment="kernel-iseries64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069781" comment="kernel-ppc64 less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 2284bd78d78b00accc68729a9634d92d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 3b9cb9db7d375a34d07fb460aad8137b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 5f3e206eac108e161bdd1b3928ce7c3e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
		</criteria>
	</criteria>
	<!-- 75c70ba80807aed777189444e17910e5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069787" comment="kernel-bigsmp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069778" comment="kernel-default less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069789" comment="kernel-kdumppae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069784" comment="kernel-smp less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069782" comment="kernel-source less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069783" comment="kernel-syms less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069790" comment="kernel-vmi less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069791" comment="kernel-vmipae less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069786" comment="kernel-debug less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069780" comment="kernel-kdump less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069785" comment="kernel-xen less than 2.6.16.60-0.89.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069788" comment="kernel-xenpae less than 2.6.16.60-0.89.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2501</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2501" source="CVE"/>
	<description>
	The png_format_buffer function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 allows remote attackers to cause a denial of service (application crash) via a crafted PNG image that triggers an out-of-bounds read during the copying of error-message data.  NOTE: this vulnerability exists because of a CVE-2004-0421 regression. NOTE: this is called an off-by-one error by some sources.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 609aeaffe7658a6e23df39f586c9edb6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria></criteria>
	<!-- cfe75a17284d23a11571eeefdcbad4a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2511</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2511" source="CVE"/>
	<description>
	Integer overflow in libvirt before 0.9.3 allows remote authenticated users to cause a denial of service (libvirtd crash) and possibly execute arbitrary code via a crafted VirDomainGetVcpus RPC call that triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d2d6a354ccf72e4ff0b1d269db57c45d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069799" comment="libvirt-devel less than 0.3.3-18.20.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069800" comment="libvirt-python less than 0.3.3-18.20.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069801" comment="libvirt less than 0.3.3-18.20.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069799" comment="libvirt-devel less than 0.3.3-18.20.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069800" comment="libvirt-python less than 0.3.3-18.20.20.1"/>
			</criteria>
		</criteria></criteria>
	<!-- d4a0a05ad27f1fce4a0f77372c50ccba -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069804" comment="libvirt-devel less than 0.3.3-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069802" comment="libvirt-python less than 0.3.3-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069803" comment="libvirt less than 0.3.3-18.22.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069804" comment="libvirt-devel less than 0.3.3-18.22.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069802" comment="libvirt-python less than 0.3.3-18.22.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2522</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522" source="CVE"/>
	<description>
	Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 676a63e0372c4e512bc5dc6178f7777a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070347" comment="cifs-mount less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070348" comment="ldapsmb less than 1.34b-25.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070360" comment="libmsrpc-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070361" comment="libmsrpc less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070349" comment="libsmbclient-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070362" comment="libsmbclient-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070350" comment="libsmbclient-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070363" comment="libsmbclient-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070351" comment="libsmbclient less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070352" comment="samba-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070364" comment="samba-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070353" comment="samba-client-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070365" comment="samba-client-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070366" comment="samba-client-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070354" comment="samba-client less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070355" comment="samba-krb-printing less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070367" comment="samba-python less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070356" comment="samba-vscan less than 0.3.6b-43.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070357" comment="samba-winbind-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070368" comment="samba-winbind-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070369" comment="samba-winbind-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070358" comment="samba-winbind less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070370" comment="samba-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070359" comment="samba less than 3.0.36-0.13.16.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070360" comment="libmsrpc-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070361" comment="libmsrpc less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070350" comment="libsmbclient-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070371" comment="libsmbsharemodes-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070372" comment="libsmbsharemodes less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070367" comment="samba-python less than 3.0.36-0.13.16.5"/>
			</criteria>
		</criteria></criteria>
	<!-- a8b9dfe1a1f2f0887e14b370023c751c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070382" comment="cifs-mount less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070383" comment="ldapsmb less than 1.34b-25.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070384" comment="libmsrpc-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070385" comment="libmsrpc less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070386" comment="libsmbclient-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070387" comment="libsmbclient-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070388" comment="libsmbclient-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070389" comment="libsmbclient-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070390" comment="libsmbclient less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070391" comment="samba-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070392" comment="samba-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070393" comment="samba-client-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070394" comment="samba-client-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070395" comment="samba-client-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070396" comment="samba-client less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070397" comment="samba-krb-printing less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070398" comment="samba-python less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070399" comment="samba-vscan less than 0.3.6b-43.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070400" comment="samba-winbind-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070401" comment="samba-winbind-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070402" comment="samba-winbind-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070403" comment="samba-winbind less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070404" comment="samba-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070405" comment="samba less than 3.0.36-0.13.16.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070382" comment="cifs-mount less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070383" comment="ldapsmb less than 1.34b-25.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070384" comment="libmsrpc-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070385" comment="libmsrpc less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070386" comment="libsmbclient-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070388" comment="libsmbclient-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070390" comment="libsmbclient less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070391" comment="samba-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070393" comment="samba-client-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070396" comment="samba-client less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070397" comment="samba-krb-printing less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070398" comment="samba-python less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070399" comment="samba-vscan less than 0.3.6b-43.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070400" comment="samba-winbind-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070403" comment="samba-winbind less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070405" comment="samba less than 3.0.36-0.13.16.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070384" comment="libmsrpc-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070385" comment="libmsrpc less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070388" comment="libsmbclient-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070406" comment="libsmbsharemodes-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070407" comment="libsmbsharemodes less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070398" comment="samba-python less than 3.0.36-0.13.16.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2525</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2525" source="CVE"/>
	<description>
	The qdisc_notify function in net/sched/sch_api.c in the Linux kernel before 2.6.35 does not prevent tc_fill_qdisc function calls referencing builtin (aka CQ_F_BUILTIN) Qdisc structures, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2526</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2526" source="CVE"/>
	<description>
	Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 157c381b5863119800aee5079e918ac9 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070174" comment="tomcat5-admin-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070175" comment="tomcat5-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070176" comment="tomcat5 less than 5.5.27-0.14.1"/>
		</criteria>
	</criteria>
	<!-- 751f5b6bd62ff252e0fe5e146292f7f9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070174" comment="tomcat5-admin-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070175" comment="tomcat5-webapps less than 5.5.27-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070176" comment="tomcat5 less than 5.5.27-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2534</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2534" source="CVE"/>
	<description>
	Buffer overflow in the clusterip_proc_write function in net/ipv4/netfilter/ipt_CLUSTERIP.c in the Linux kernel before 2.6.39 might allow local users to cause a denial of service or have unspecified other impact via a crafted write operation, related to string data that lacks a terminating '\0' character.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2597</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2597" source="CVE"/>
	<description>
	The Lucent/Ascend file parser in Wireshark 1.2.x before 1.2.18, 1.4.x through 1.4.7, and 1.6.0 allows remote attackers to cause a denial of service (infinite loop) via malformed packets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- 566da20a8a85d82c440c7080cf808642 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071945" comment="wireshark less than 1.4.10-0.40.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2660</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
	</affected>
	<reference ref_id="CVE-2011-2660" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2660" source="CVE"/>
	<description>
	The modify_resolvconf_suse script in the vpnc package before 0.5.1-55.10.1 in SUSE Linux Enterprise Desktop 11 SP1 might allow remote attackers to execute arbitrary commands via a crafted DNS domain name.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- c20cf0ea159b734a4c238f91d6079558 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070145" comment="vpnc less than 0.5.1-1.7.1"/>
	</criteria>
	<!-- d80571c9566fe6b9ee2efa51fc0c0bb1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070145" comment="vpnc less than 0.5.1-1.7.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2685</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2685" source="CVE"/>
	<description>
	Stack-based buffer overflow in the Lotus Word Pro import filter in LibreOffice before 3.3.3 allows remote attackers to execute arbitrary code via a crafted .lwp file.
	</description>
 </metadata>
<!-- 50eeb8254bb462e482c3c796587985e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107309" comment="libreoffice-cs less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107311" comment="libreoffice-de less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107314" comment="libreoffice-es less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107316" comment="libreoffice-fr less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107317" comment="libreoffice-galleries less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107318" comment="libreoffice-gnome less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107321" comment="libreoffice-hu less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107322" comment="libreoffice-it less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107323" comment="libreoffice-ja less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107324" comment="libreoffice-kde less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107326" comment="libreoffice-mono less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107330" comment="libreoffice-pl less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107331" comment="libreoffice-pt-BR less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107333" comment="libreoffice-sk less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107336" comment="libreoffice-zh-CN less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107337" comment="libreoffice-zh-TW less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107339" comment="libreoffice less than 3.4.2.6-2.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2686</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2686" source="CVE"/>
	<description>
	Ruby before 1.8.7-p352 does not reset the random seed upon forking, which makes it easier for context-dependent attackers to predict the values of random numbers by leveraging knowledge of the number sequence obtained in a different child process, a related issue to CVE-2003-0900.  NOTE: this issue exists because of a regression during Ruby 1.8.6 development.
	</description>
 </metadata>
<!-- 4c9e95f258c3139c5c70de419c8f734b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076979" comment="ruby-devel less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076980" comment="ruby-doc-html less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076981" comment="ruby-doc-ri less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076982" comment="ruby-examples less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076983" comment="ruby-test-suite less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076984" comment="ruby-tk less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076967" comment="ruby less than 1.8.6.p369-0.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2690</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2690" source="CVE"/>
	<description>
	Buffer overflow in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4, when used by an application that calls the png_rgb_to_gray function but not the png_set_expand function, allows remote attackers to overwrite memory with an arbitrary amount of data, and possibly have unspecified other impact, via a crafted PNG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 609aeaffe7658a6e23df39f586c9edb6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria></criteria>
	<!-- cfe75a17284d23a11571eeefdcbad4a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2691</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2691" source="CVE"/>
	<description>
	The png_err function in pngerror.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 makes a function call using a NULL pointer argument instead of an empty-string argument, which allows remote attackers to cause a denial of service (application crash) via a crafted PNG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 609aeaffe7658a6e23df39f586c9edb6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria></criteria>
	<!-- cfe75a17284d23a11571eeefdcbad4a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2692</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2692" source="CVE"/>
	<description>
	The png_handle_sCAL function in pngrutil.c in libpng 1.0.x before 1.0.55, 1.2.x before 1.2.45, 1.4.x before 1.4.8, and 1.5.x before 1.5.4 does not properly handle invalid sCAL chunks, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted PNG image that triggers the reading of uninitialized memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 609aeaffe7658a6e23df39f586c9edb6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
			</criteria>
		</criteria></criteria>
	<!-- cfe75a17284d23a11571eeefdcbad4a8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009069827" comment="libpng-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069828" comment="libpng-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069829" comment="libpng-devel-32bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069830" comment="libpng-devel-64bit less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069831" comment="libpng-devel less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069832" comment="libpng-x86 less than 1.2.8-19.31.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069833" comment="libpng less than 1.2.8-19.31.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2694</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2694" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 676a63e0372c4e512bc5dc6178f7777a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070347" comment="cifs-mount less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070348" comment="ldapsmb less than 1.34b-25.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070360" comment="libmsrpc-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070361" comment="libmsrpc less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070349" comment="libsmbclient-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070362" comment="libsmbclient-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070350" comment="libsmbclient-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070363" comment="libsmbclient-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070351" comment="libsmbclient less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070352" comment="samba-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070364" comment="samba-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070353" comment="samba-client-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070365" comment="samba-client-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070366" comment="samba-client-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070354" comment="samba-client less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070355" comment="samba-krb-printing less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070367" comment="samba-python less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070356" comment="samba-vscan less than 0.3.6b-43.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070357" comment="samba-winbind-32bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070368" comment="samba-winbind-64bit less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070369" comment="samba-winbind-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070358" comment="samba-winbind less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070370" comment="samba-x86 less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070359" comment="samba less than 3.0.36-0.13.16.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070360" comment="libmsrpc-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070361" comment="libmsrpc less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070350" comment="libsmbclient-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070371" comment="libsmbsharemodes-devel less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070372" comment="libsmbsharemodes less than 3.0.36-0.13.16.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070367" comment="samba-python less than 3.0.36-0.13.16.5"/>
			</criteria>
		</criteria></criteria>
	<!-- 7647f10c23183441620c089dfae68cd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104335" comment="cifs-mount less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104336" comment="libmsrpc-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104337" comment="libmsrpc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104338" comment="libsmbclient-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104339" comment="libsmbclient-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104340" comment="libsmbclient less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104341" comment="samba-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104342" comment="samba-client-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104343" comment="samba-client less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104344" comment="samba-doc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104345" comment="samba-krb-printing less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104346" comment="samba-python less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104347" comment="samba-vscan less than 0.3.6b-42.85.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104348" comment="samba-winbind-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104349" comment="samba-winbind less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104350" comment="samba less than 3.0.32-0.20.1"/>
		</criteria>
	</criteria>
	<!-- a8b9dfe1a1f2f0887e14b370023c751c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070382" comment="cifs-mount less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070383" comment="ldapsmb less than 1.34b-25.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070384" comment="libmsrpc-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070385" comment="libmsrpc less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070386" comment="libsmbclient-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070387" comment="libsmbclient-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070388" comment="libsmbclient-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070389" comment="libsmbclient-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070390" comment="libsmbclient less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070391" comment="samba-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070392" comment="samba-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070393" comment="samba-client-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070394" comment="samba-client-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070395" comment="samba-client-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070396" comment="samba-client less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070397" comment="samba-krb-printing less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070398" comment="samba-python less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070399" comment="samba-vscan less than 0.3.6b-43.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070400" comment="samba-winbind-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070401" comment="samba-winbind-64bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070402" comment="samba-winbind-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070403" comment="samba-winbind less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070404" comment="samba-x86 less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070405" comment="samba less than 3.0.36-0.13.16.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070382" comment="cifs-mount less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070383" comment="ldapsmb less than 1.34b-25.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070384" comment="libmsrpc-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070385" comment="libmsrpc less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070386" comment="libsmbclient-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070388" comment="libsmbclient-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070390" comment="libsmbclient less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070391" comment="samba-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070393" comment="samba-client-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070396" comment="samba-client less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070397" comment="samba-krb-printing less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070398" comment="samba-python less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070399" comment="samba-vscan less than 0.3.6b-43.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070400" comment="samba-winbind-32bit less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070403" comment="samba-winbind less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070405" comment="samba less than 3.0.36-0.13.16.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070384" comment="libmsrpc-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070385" comment="libmsrpc less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070388" comment="libsmbclient-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070406" comment="libsmbsharemodes-devel less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070407" comment="libsmbsharemodes less than 3.0.36-0.13.16.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070398" comment="samba-python less than 3.0.36-0.13.16.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2696</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2696" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2696" source="CVE"/>
	<description>
	Integer overflow in libsndfile before 1.0.25 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PARIS Audio Format (PAF) file that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 353cec4df70fe9d46be9127fe99a5ebf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069638" comment="libsndfile-32bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069641" comment="libsndfile-64bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069642" comment="libsndfile-x86 less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069640" comment="libsndfile less than 1.0.12-13.13.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
		</criteria></criteria>
	<!-- 58c640f70169a604644449c65c73c2ad -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069638" comment="libsndfile-32bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069641" comment="libsndfile-64bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069642" comment="libsndfile-x86 less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069640" comment="libsndfile less than 1.0.12-13.13.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009069638" comment="libsndfile-32bit less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069640" comment="libsndfile less than 1.0.12-13.13.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009069639" comment="libsndfile-devel less than 1.0.12-13.13.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2697</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2697" source="CVE"/>
	<description>
	foomatic-rip-hplip in HP Linux Imaging and Printing (HPLIP) 3.11.5 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58f89f5819e70d5cd3e625d249e8c5c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069769" comment="foomatic-filters less than 3.0.2-20.11.1"/>
	</criteria>
	<!-- c5e8c3a57cc20b1738db06ab8cbce70e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069769" comment="foomatic-filters less than 3.0.2-20.11.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2698</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2698" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2698" source="CVE"/>
	<description>
	Off-by-one error in the elem_cell_id_aux function in epan/dissectors/packet-ansi_a.c in the ANSI MAP dissector in Wireshark 1.4.x before 1.4.8 and 1.6.x before 1.6.1 allows remote attackers to cause a denial of service (infinite loop) via an invalid packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2699</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2699" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2699" source="CVE"/>
	<description>
	The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2709</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2709" source="CVE"/>
	<description>
	libgssapi and libgssglue before 0.4 do not properly check privileges, which allows local users to load untrusted configuration files and execute arbitrary code via the GSSAPI_MECH_CONF environment variable, as demonstrated using mount.nfs.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b5de538464acbf06386b39d37563e66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074791" comment="libgssapi-32bit less than 0.6-13.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074793" comment="libgssapi-64bit less than 0.6-13.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074794" comment="libgssapi-x86 less than 0.6-13.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074792" comment="libgssapi less than 0.6-13.12.1"/>
		</criteria>
	</criteria>
	<!-- 88b0a4c3666d54637f8fff06918865ef -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074791" comment="libgssapi-32bit less than 0.6-13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074793" comment="libgssapi-64bit less than 0.6-13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074794" comment="libgssapi-x86 less than 0.6-13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074792" comment="libgssapi less than 0.6-13.12.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074791" comment="libgssapi-32bit less than 0.6-13.12.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074792" comment="libgssapi less than 0.6-13.12.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2713</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-2713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2713" source="CVE"/>
	<description>
	oowriter in OpenOffice.org 3.3.0 and LibreOffice before 3.4.3 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted DOC file that triggers an out-of-bounds read in the DOC sprm parser.
	</description>
 </metadata>
<!-- 50eeb8254bb462e482c3c796587985e5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107309" comment="libreoffice-cs less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107311" comment="libreoffice-de less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107314" comment="libreoffice-es less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107316" comment="libreoffice-fr less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107317" comment="libreoffice-galleries less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107318" comment="libreoffice-gnome less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107321" comment="libreoffice-hu less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107322" comment="libreoffice-it less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107323" comment="libreoffice-ja less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107324" comment="libreoffice-kde less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107326" comment="libreoffice-mono less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107330" comment="libreoffice-pl less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107331" comment="libreoffice-pt-BR less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107333" comment="libreoffice-sk less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107336" comment="libreoffice-zh-CN less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107337" comment="libreoffice-zh-TW less than 3.4.2.6-2.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107339" comment="libreoffice less than 3.4.2.6-2.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2721</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2721" source="CVE"/>
	<description>
	Off-by-one error in the cli_hm_scan function in matcher-hash.c in libclamav in ClamAV before 0.97.2 allows remote attackers to cause a denial of service (daemon crash) via an e-mail message that is not properly handled during certain hash calculations.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- eedbb08627a64819aee71b8dd9392c51 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070055" comment="clamav less than 0.97.2-1.5.2"/>
	</criteria>
	<!-- ffef53f33fdb46ce9c3231beb182dac8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070055" comment="clamav less than 0.97.2-1.5.2"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2728</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2728" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2728" source="CVE"/>
	<description>
	The bsd_glob function in the File::Glob module for Perl before 5.14.2 allows context-dependent attackers to cause a denial of service (crash) via a glob expression with the GLOB_ALTDIRFUNC flag, which triggers an uninitialized pointer dereference.
	</description>
 </metadata>
<!-- ed1929d51b82752f08399dada0ae2769 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076769" comment="perl-32bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076779" comment="perl-64bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076780" comment="perl-x86 less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076770" comment="perl less than 5.8.8-14.21.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2748</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2748" source="CVE"/>
	<description>
	The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted DHCP packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b3649ade0ae5a79682a3c4e32ca2ae8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070481" comment="dhcp-client less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070482" comment="dhcp-devel less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070483" comment="dhcp-relay less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070484" comment="dhcp-server less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070485" comment="dhcp less than 3.0.7-7.7.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070482" comment="dhcp-devel less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070483" comment="dhcp-relay less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070484" comment="dhcp-server less than 3.0.7-7.7.14.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c41557ebbb59f76a37efcec0250609d9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070487" comment="dhcp-client less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070489" comment="dhcp-devel less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070490" comment="dhcp-relay less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070491" comment="dhcp-server less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070488" comment="dhcp less than 3.0.7-7.15.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070489" comment="dhcp-devel less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070490" comment="dhcp-relay less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070491" comment="dhcp-server less than 3.0.7-7.15.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2749</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2749" source="CVE"/>
	<description>
	The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before 3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to cause a denial of service (daemon exit) via a crafted BOOTP packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4b3649ade0ae5a79682a3c4e32ca2ae8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070481" comment="dhcp-client less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070482" comment="dhcp-devel less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070483" comment="dhcp-relay less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070484" comment="dhcp-server less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070485" comment="dhcp less than 3.0.7-7.7.14.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070482" comment="dhcp-devel less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070483" comment="dhcp-relay less than 3.0.7-7.7.14.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070484" comment="dhcp-server less than 3.0.7-7.7.14.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c41557ebbb59f76a37efcec0250609d9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070487" comment="dhcp-client less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070489" comment="dhcp-devel less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070490" comment="dhcp-relay less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070491" comment="dhcp-server less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070488" comment="dhcp less than 3.0.7-7.15.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070489" comment="dhcp-devel less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070490" comment="dhcp-relay less than 3.0.7-7.15.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070491" comment="dhcp-server less than 3.0.7-7.15.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2895</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2895" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2895" source="CVE"/>
	<description>
	The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a2ab2f33ca77404c8f69d54b080bce6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072070" comment="xorg-x11-Xnest less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072071" comment="xorg-x11-Xvfb less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072072" comment="xorg-x11-Xvnc less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072073" comment="xorg-x11-devel-32bit less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072086" comment="xorg-x11-devel-64bit less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072074" comment="xorg-x11-devel less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072087" comment="xorg-x11-doc less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072075" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072076" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072077" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072078" comment="xorg-x11-fonts-scalable less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072079" comment="xorg-x11-fonts-syriac less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072080" comment="xorg-x11-libs-32bit less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072088" comment="xorg-x11-libs-64bit less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072089" comment="xorg-x11-libs-x86 less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072081" comment="xorg-x11-libs less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072082" comment="xorg-x11-man less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072090" comment="xorg-x11-sdk less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072083" comment="xorg-x11-server-glx less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072084" comment="xorg-x11-server less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072085" comment="xorg-x11 less than 6.9.0-50.76.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072071" comment="xorg-x11-Xvfb less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072087" comment="xorg-x11-doc less than 6.9.0-50.76.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072090" comment="xorg-x11-sdk less than 6.9.0-50.76.4"/>
			</criteria>
		</criteria></criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 7e775f10b0282368905503b130ebadf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072149" comment="freetype2-32bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072153" comment="freetype2-64bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072150" comment="freetype2-devel-32bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072154" comment="freetype2-devel-64bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072151" comment="freetype2-devel less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072155" comment="freetype2-x86 less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072152" comment="freetype2 less than 2.1.10-18.27.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2896</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2896" source="CVE"/>
	<description>
	The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04fb5b2bf484dc76bc84deae45c8209f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071518" comment="gimp-devel less than 2.2.10-22.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071519" comment="gimp less than 2.2.10-22.40.1"/>
		</criteria>
	</criteria>
	<!-- 42ba2134eb181dc7c5bf357ca014919a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071524" comment="gimp-devel less than 2.2.10-22.35.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071525" comment="gimp less than 2.2.10-22.35.36.1"/>
		</criteria>
	</criteria>
	<!-- 58f92f1602b118d40cc39ae74d76028f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
		</criteria>
	</criteria>
	<!-- f9598c04d95b42f071c19e519984ca37 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2897</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2897" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 1e4fac303fda249f28a90f89a7455837 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074864" comment="gdk-pixbuf-32bit less than 0.22.0-93.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074880" comment="gdk-pixbuf-64bit less than 0.22.0-93.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074881" comment="gdk-pixbuf-x86 less than 0.22.0-93.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074865" comment="gdk-pixbuf less than 0.22.0-93.9.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074882" comment="gdk-pixbuf-devel less than 0.22.0-93.9.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2901</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2901" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2901" source="CVE"/>
	<description>
	Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1a3d8df4480b5a9e000bc582606a1bae -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070195" comment="xen-devel less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070196" comment="xen-doc-html less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070197" comment="xen-doc-pdf less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070198" comment="xen-doc-ps less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070199" comment="xen-kmp-bigsmp less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070208" comment="xen-kmp-debug less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070200" comment="xen-kmp-default less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070209" comment="xen-kmp-kdump less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070210" comment="xen-kmp-kdumppae less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070201" comment="xen-kmp-smp less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070211" comment="xen-kmp-vmi less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070212" comment="xen-kmp-vmipae less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070202" comment="xen-libs-32bit less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070203" comment="xen-libs less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070204" comment="xen-tools-domU less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070205" comment="xen-tools-ioemu less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070206" comment="xen-tools less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070207" comment="xen less than 3.2.3_17040_37-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070195" comment="xen-devel less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070208" comment="xen-kmp-debug less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070209" comment="xen-kmp-kdump less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070202" comment="xen-libs-32bit less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070203" comment="xen-libs less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070205" comment="xen-tools-ioemu less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070206" comment="xen-tools less than 3.2.3_17040_37-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070207" comment="xen less than 3.2.3_17040_37-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8cb29b577c0a831bd5c0067789950f17 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070576" comment="xen-doc-html less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070577" comment="xen-doc-pdf less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070578" comment="xen-doc-ps less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070579" comment="xen-kmp-bigsmp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070581" comment="xen-kmp-default less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070583" comment="xen-kmp-kdumppae less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070584" comment="xen-kmp-smp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070585" comment="xen-kmp-vmi less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070586" comment="xen-kmp-vmipae less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070589" comment="xen-tools-domU less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070576" comment="xen-doc-html less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070577" comment="xen-doc-pdf less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070578" comment="xen-doc-ps less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070581" comment="xen-kmp-default less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070584" comment="xen-kmp-smp less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070589" comment="xen-tools-domU less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070575" comment="xen-devel less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070580" comment="xen-kmp-debug less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070582" comment="xen-kmp-kdump less than 3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070587" comment="xen-libs-32bit less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070588" comment="xen-libs less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070590" comment="xen-tools-ioemu less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070591" comment="xen-tools less than 3.2.3_17040_26-0.6.2.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070592" comment="xen less than 3.2.3_17040_26-0.6.2.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2928</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2928" source="CVE"/>
	<description>
	The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3395803e5857d3e0f44b39331dc3b010 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107340" comment="kernel-bigsmp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107342" comment="kernel-kdumppae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107343" comment="kernel-vmi less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107344" comment="kernel-vmipae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 74169532cbeb6a34c2168ce4ce202dbf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- 96d47125b6fb737bee4bf3f7619aa63d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9fe1c1f891de7bb8b0abad73549e497a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074617" comment="kernel-iseries64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074618" comment="kernel-ppc64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- d66830daf8e6d37d2c64dfa779e3a77d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2964</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2964" source="CVE"/>
	<description>
	foomaticrip.c in foomatic-rip in foomatic-filters in Foomatic 4.0.6 allows remote attackers to execute arbitrary code via a crafted *FoomaticRIPCommandLine field in a .ppd file, a different vulnerability than CVE-2011-2697.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58f89f5819e70d5cd3e625d249e8c5c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069769" comment="foomatic-filters less than 3.0.2-20.11.1"/>
	</criteria>
	<!-- c5e8c3a57cc20b1738db06ab8cbce70e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009069769" comment="foomatic-filters less than 3.0.2-20.11.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2980</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2980" source="CVE"/>
	<description>
	Untrusted search path vulnerability in the ThinkPadSensor::Startup function in Mozilla Firefox before 3.6.20, Thunderbird 3.x before 3.1.12, allows local users to gain privileges by leveraging write access in an unspecified directory to place a Trojan horse DLL that is loaded into the running Firefox process.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24df2ef0dad5f3b46261e6f99333badf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
	<!-- b2e45f3a2377c8c0b0d85d6e8dc698c3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2981</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2981" source="CVE"/>
	<description>
	The event-management implementation in Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly select the context for script to run in, which allows remote attackers to bypass the Same Origin Policy or execute arbitrary JavaScript code with chrome privileges via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24df2ef0dad5f3b46261e6f99333badf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
	<!-- b2e45f3a2377c8c0b0d85d6e8dc698c3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2982</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2982" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24df2ef0dad5f3b46261e6f99333badf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
	<!-- b2e45f3a2377c8c0b0d85d6e8dc698c3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2983</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2983" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.20, Thunderbird 2.x and 3.x before 3.1.12, SeaMonkey 1.x and 2.x, and possibly other products does not properly handle the RegExp.input property, which allows remote attackers to bypass the Same Origin Policy and read data from a different domain via a crafted web site, possibly related to a use-after-free.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24df2ef0dad5f3b46261e6f99333badf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
	<!-- b2e45f3a2377c8c0b0d85d6e8dc698c3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2984</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2984" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.20, SeaMonkey 2.x, Thunderbird 3.x before 3.1.12, and possibly other products does not properly handle the dropping of a tab element, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by establishing a content area and registering for drop events.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24df2ef0dad5f3b46261e6f99333badf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
	<!-- b2e45f3a2377c8c0b0d85d6e8dc698c3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070101" comment="MozillaFirefox-translations less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070102" comment="MozillaFirefox less than 3.6.20-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070103" comment="mozilla-xulrunner192-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070104" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070105" comment="mozilla-xulrunner192-gnome less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070106" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070107" comment="mozilla-xulrunner192-translations less than 1.9.2.20-1.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070108" comment="mozilla-xulrunner192 less than 1.9.2.20-1.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070109" comment="MozillaFirefox-branding-upstream less than 3.6.20-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2995</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2995" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10c4cb33ededc2c321d18a148b90acfb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- 8026ac2197f43942ee30e9d32864f793 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2996</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2996" source="CVE"/>
	<description>
	Unspecified vulnerability in the plugin API in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10c4cb33ededc2c321d18a148b90acfb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- 8026ac2197f43942ee30e9d32864f793 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2998</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2998" source="CVE"/>
	<description>
	Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression.
	</description>
 </metadata>
<!-- d38a557341c2b284b12c5c1e21800a6d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20112999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-2999</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-2999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2999" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle "location" as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a different vulnerability than CVE-2010-0170.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10c4cb33ededc2c321d18a148b90acfb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- 8026ac2197f43942ee30e9d32864f793 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3000</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3000" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 10c4cb33ededc2c321d18a148b90acfb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- 8026ac2197f43942ee30e9d32864f793 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070820" comment="MozillaFirefox-translations less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070821" comment="MozillaFirefox less than 3.6.23-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070822" comment="mozilla-xulrunner192-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070823" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070824" comment="mozilla-xulrunner192-gnome less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070825" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070826" comment="mozilla-xulrunner192-translations less than 1.9.2.23-1.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070827" comment="mozilla-xulrunner192 less than 1.9.2.23-1.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070828" comment="MozillaFirefox-branding-upstream less than 3.6.23-0.5.1"/>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3001</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3001" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error.
	</description>
 </metadata>
<!-- d38a557341c2b284b12c5c1e21800a6d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3026</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3026" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3026" source="CVE"/>
	<description>
	Integer overflow in libpng, as used in Google Chrome before 17.0.963.56, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2690ba40942c362f70510de200d29b85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073133" comment="libpng-32bit less than 1.2.8-19.33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073137" comment="libpng-64bit less than 1.2.8-19.33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073134" comment="libpng-devel-32bit less than 1.2.8-19.33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073138" comment="libpng-devel-64bit less than 1.2.8-19.33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073135" comment="libpng-devel less than 1.2.8-19.33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073139" comment="libpng-x86 less than 1.2.8-19.33.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073136" comment="libpng less than 1.2.8-19.33.7"/>
		</criteria>
	</criteria>
	<!-- 2c23debb2e4e3a09d318252e02175814 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073034" comment="MozillaFirefox-translations less than 3.6.27-0.5.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073035" comment="MozillaFirefox less than 3.6.27-0.5.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073036" comment="mozilla-xulrunner192-32bit less than 1.9.2.27-0.5.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073037" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.27-0.5.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073038" comment="mozilla-xulrunner192-gnome less than 1.9.2.27-0.5.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073039" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.27-0.5.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073040" comment="mozilla-xulrunner192-translations less than 1.9.2.27-0.5.6"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073041" comment="mozilla-xulrunner192 less than 1.9.2.27-0.5.6"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073042" comment="MozillaFirefox-branding-upstream less than 3.6.27-0.5.4"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3048</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3048" source="CVE"/>
	<description>
	The png_set_text_2 function in pngset.c in libpng 1.0.x before 1.0.59, 1.2.x before 1.2.49, 1.4.x before 1.4.11, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a crafted text chunk in a PNG image file, which triggers a memory allocation failure that is not properly handled, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 62fa6d82a602002d1a921c7a7707c533 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074568" comment="libpng-32bit less than 1.2.8-19.35.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074572" comment="libpng-64bit less than 1.2.8-19.35.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074569" comment="libpng-devel-32bit less than 1.2.8-19.35.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074573" comment="libpng-devel-64bit less than 1.2.8-19.35.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074570" comment="libpng-devel less than 1.2.8-19.35.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074574" comment="libpng-x86 less than 1.2.8-19.35.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074571" comment="libpng less than 1.2.8-19.35.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3062</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3062" source="CVE"/>
	<description>
	Off-by-one error in the OpenType Sanitizer in Google Chrome before 18.0.1025.142 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted OpenType file.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3101</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3101" source="CVE"/>
	<description>
	Google Chrome before 19.0.1084.46 on Linux does not properly mitigate an unspecified flaw in an NVIDIA driver, which has unknown impact and attack vectors.  NOTE: see CVE-2012-3105 for the related MFSA 2012-34 issue in Mozilla products.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3102</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3102" source="CVE"/>
	<description>
	Off-by-one error in libxml2, as used in Google Chrome before 19.0.1084.46 and other products, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7b174cf04bc60f0775dbbdbb0c987eb1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074776" comment="libxml2-32bit less than 2.6.23-15.31.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074780" comment="libxml2-64bit less than 2.6.23-15.31.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074777" comment="libxml2-devel-32bit less than 2.6.23-15.31.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074781" comment="libxml2-devel-64bit less than 2.6.23-15.31.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074778" comment="libxml2-devel less than 2.6.23-15.31.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074782" comment="libxml2-x86 less than 2.6.23-15.31.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074779" comment="libxml2 less than 2.6.23-15.31.4"/>
		</criteria>
	</criteria>
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3131</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-3131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3131" source="CVE"/>
	<description>
	Xen 4.1.1 and earlier allows local guest OS kernels with control of a PCI[E] device to cause a denial of service (CPU consumption and host hang) via many crafted DMA requests that are denied by the IOMMU, which triggers a livelock.
	</description>
 </metadata>
<!-- 1a3d8df4480b5a9e000bc582606a1bae -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070195" comment="xen-devel less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070196" comment="xen-doc-html less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070197" comment="xen-doc-pdf less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070198" comment="xen-doc-ps less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070199" comment="xen-kmp-bigsmp less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070208" comment="xen-kmp-debug less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070200" comment="xen-kmp-default less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070209" comment="xen-kmp-kdump less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070210" comment="xen-kmp-kdumppae less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070201" comment="xen-kmp-smp less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070211" comment="xen-kmp-vmi less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070212" comment="xen-kmp-vmipae less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070202" comment="xen-libs-32bit less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070203" comment="xen-libs less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070204" comment="xen-tools-domU less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070205" comment="xen-tools-ioemu less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070206" comment="xen-tools less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070207" comment="xen less than 3.2.3_17040_37-0.9.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070195" comment="xen-devel less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070208" comment="xen-kmp-debug less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070209" comment="xen-kmp-kdump less than 3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070202" comment="xen-libs-32bit less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070203" comment="xen-libs less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070205" comment="xen-tools-ioemu less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070206" comment="xen-tools less than 3.2.3_17040_37-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070207" comment="xen less than 3.2.3_17040_37-0.9.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3148</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3148" source="CVE"/>
	<description>
	Stack-based buffer overflow in the _assemble_line function in modules/pam_env/pam_env.c in Linux-PAM (aka pam) before 1.1.5 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a long string of white spaces at the beginning of the ~/.pam_environment file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ba74f77a051fc5825c4e8658b8fadde6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071652" comment="pam-32bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071655" comment="pam-64bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071656" comment="pam-devel-32bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071657" comment="pam-devel-64bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071653" comment="pam-devel less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071658" comment="pam-x86 less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071654" comment="pam less than 0.99.6.3-28.25.4"/>
		</criteria>
	</criteria>
	<!-- c3b33b1f77a3515061a441ec5f6b289b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071659" comment="pam-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071660" comment="pam-64bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071661" comment="pam-devel-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071662" comment="pam-devel-64bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071663" comment="pam-devel less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071664" comment="pam-x86 less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071665" comment="pam less than 0.99.6.3-28.20.3.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071659" comment="pam-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071661" comment="pam-devel-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071663" comment="pam-devel less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071665" comment="pam less than 0.99.6.3-28.20.3.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3149</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3149" source="CVE"/>
	<description>
	The _expand_arg function in the pam_env module (modules/pam_env/pam_env.c) in Linux-PAM (aka pam) before 1.1.5 does not properly handle when environment variable expansion can overflow, which allows local users to cause a denial of service (CPU consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ba74f77a051fc5825c4e8658b8fadde6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071652" comment="pam-32bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071655" comment="pam-64bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071656" comment="pam-devel-32bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071657" comment="pam-devel-64bit less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071653" comment="pam-devel less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071658" comment="pam-x86 less than 0.99.6.3-28.25.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071654" comment="pam less than 0.99.6.3-28.25.4"/>
		</criteria>
	</criteria>
	<!-- c3b33b1f77a3515061a441ec5f6b289b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071659" comment="pam-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071660" comment="pam-64bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071661" comment="pam-devel-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071662" comment="pam-devel-64bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071663" comment="pam-devel less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071664" comment="pam-x86 less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071665" comment="pam less than 0.99.6.3-28.20.3.4"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071659" comment="pam-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071661" comment="pam-devel-32bit less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071663" comment="pam-devel less than 0.99.6.3-28.20.3.4"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071665" comment="pam less than 0.99.6.3-28.20.3.4"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3170</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3170" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3170" source="CVE"/>
	<description>
	The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 58f92f1602b118d40cc39ae74d76028f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
		</criteria>
	</criteria>
	<!-- f9598c04d95b42f071c19e519984ca37 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071185" comment="cups-libs-64bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071186" comment="cups-libs-x86 less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071180" comment="cups-client less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071181" comment="cups-devel less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071182" comment="cups-libs-32bit less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071183" comment="cups-libs less than 1.1.23-40.62.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071184" comment="cups less than 1.1.23-40.62.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3171</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3171" source="CVE"/>
	<description>
	Directory traversal vulnerability in pure-FTPd 1.0.22 and possibly other versions, when running on SUSE Linux Enterprise Server and possibly other operating systems, when the Netware OES remote server feature is enabled, allows local users to overwrite arbitrary files via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9a99a741b9d38804b2622f8b9adfa22a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070531" comment="pure-ftpd less than 1.0.22-0.26.1"/>
	</criteria>
	<!-- c52bd104fe2da41024af9337e1af6c2e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070531" comment="pure-ftpd less than 1.0.22-0.26.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3182" source="CVE"/>
	<description>
	PHP before 5.3.7 does not properly check the return values of the malloc, calloc, and realloc library functions, which allows context-dependent attackers to cause a denial of service (NULL pointer dereference and application crash) or trigger a buffer overflow by leveraging the ability to provide an arbitrary value for a function argument, related to (1) ext/curl/interface.c, (2) ext/date/lib/parse_date.c, (3) ext/date/lib/parse_iso_intervals.c, (4) ext/date/lib/parse_tz.c, (5) ext/date/lib/timelib.c, (6) ext/pdo_odbc/pdo_odbc.c, (7) ext/reflection/php_reflection.c, (8) ext/soap/php_sdl.c, (9) ext/xmlrpc/libxmlrpc/base64.c, (10) TSRM/tsrm_win32.c, and (11) the strtotime function.
	</description>
 </metadata>
<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3190</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3190" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3190" source="CVE"/>
	<description>
	Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 019238c82938bdc9029bedbd9f22d592 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070907" comment="tomcat5-admin-webapps less than 5.5.27-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070908" comment="tomcat5-webapps less than 5.5.27-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070909" comment="tomcat5 less than 5.5.27-0.16.1"/>
		</criteria>
	</criteria>
	<!-- eca70d25541f4c6ac539dbed38a588f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070907" comment="tomcat5-admin-webapps less than 5.5.27-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070908" comment="tomcat5-webapps less than 5.5.27-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070909" comment="tomcat5 less than 5.5.27-0.16.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3191</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3191" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3191" source="CVE"/>
	<description>
	Integer signedness error in the CIFSFindNext function in fs/cifs/cifssmb.c in the Linux kernel before 3.1 allows remote CIFS servers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large length value in a response to a read request for a directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 14f999b2da14400252037984b14f317a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070561" comment="kernel-bigsmp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070565" comment="kernel-kdumppae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070569" comment="kernel-vmi less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070570" comment="kernel-vmipae less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070572" comment="kernel-xenpae less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 169bd714365eb7c38e38540921171d06 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- 4f2403980de031813f91f813b6171179 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070573" comment="kernel-iseries64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070574" comment="kernel-ppc64 less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- 6253a90635c740c154fb5e3cc64612f2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071616" comment="kernel-bigsmp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071621" comment="kernel-kdumppae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071622" comment="kernel-vmi less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071623" comment="kernel-vmipae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 8c7d79d86d626d9e405009e6174cabd5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
		</criteria></criteria>
	<!-- a2be52185ebaeba245a1c8aff0c659e2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070566" comment="kernel-smp less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009070562" comment="kernel-debug less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070564" comment="kernel-kdump less than 2.6.16.60-0.83.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009070571" comment="kernel-xen less than 2.6.16.60-0.83.2"/>
			</criteria>
		</criteria></criteria>
	<!-- a70d925c5736ccbb5c46bf7c01dfdfb6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070563" comment="kernel-default less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070567" comment="kernel-source less than 2.6.16.60-0.83.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070568" comment="kernel-syms less than 2.6.16.60-0.83.2"/>
		</criteria>
	</criteria>
	<!-- b1201574824e860419470a1e97bdba2c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
		</criteria>
	</criteria>
	<!-- be6b41cc85222e68513448b61b7af786 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c4377326fa8f6c8c833ef411e531a291 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071624" comment="kernel-iseries64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071625" comment="kernel-ppc64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3192</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3192" source="CVE"/>
	<description>
	The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through 2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a denial of service (memory and CPU consumption) via a Range header that expresses multiple overlapping ranges, as exploited in the wild in August 2011, a different vulnerability than CVE-2007-0086.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5e275ea53de9c9e1156fe626e80e6066 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104359" comment="apache2-devel less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104360" comment="apache2-doc less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104361" comment="apache2-example-pages less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104362" comment="apache2-prefork less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104363" comment="apache2-worker less than 2.2.3-16.25.40"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104364" comment="apache2 less than 2.2.3-16.25.40"/>
		</criteria>
	</criteria>
	<!-- 93f3f0fb2aeae6252ba07a3f17184bb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104365" comment="apache2-devel less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104366" comment="apache2-doc less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104367" comment="apache2-example-pages less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104368" comment="apache2-prefork less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104369" comment="apache2-worker less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104370" comment="apache2 less than 2.2.3-16.32.37.1"/>
		</criteria>
	</criteria>
	<!-- 9df41a2f243057be246685d2d329cdf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072233" comment="apache2-devel less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072234" comment="apache2-doc less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072235" comment="apache2-example-pages less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072236" comment="apache2-prefork less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072237" comment="apache2-worker less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072238" comment="apache2 less than 2.2.3-16.42.2"/>
		</criteria>
	</criteria>
	<!-- c1d4ee926550fcf7502509517b2210e4 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070444" comment="apache2-devel less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070445" comment="apache2-doc less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070446" comment="apache2-example-pages less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070447" comment="apache2-prefork less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070448" comment="apache2-worker less than 2.2.3-16.32.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070449" comment="apache2 less than 2.2.3-16.32.35.1"/>
		</criteria>
	</criteria>
	<!-- c3940d73bd140b3d6d6e2d878f94f4f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070438" comment="apache2-devel less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070439" comment="apache2-doc less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070440" comment="apache2-example-pages less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070441" comment="apache2-prefork less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070442" comment="apache2-worker less than 2.2.3-16.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070443" comment="apache2 less than 2.2.3-16.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3208</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3208" source="CVE"/>
	<description>
	Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b6ed7bef7f64c0cf0aa2c5bc6a20c96 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070536" comment="cyrus-imapd-devel less than 2.2.12-27.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070537" comment="cyrus-imapd less than 2.2.12-27.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070538" comment="perl-Cyrus-IMAP less than 2.2.12-27.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070539" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.28.1"/>
		</criteria>
	</criteria>
	<!-- 77926d551f499c33d866c6d38a8bdfc8 -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070553" comment="cyrus-imapd-devel less than 2.2.12-27.16.30.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070554" comment="cyrus-imapd less than 2.2.12-27.16.30.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070555" comment="perl-Cyrus-IMAP less than 2.2.12-27.16.30.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070556" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.16.30.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3209</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3209" source="CVE"/>
	<description>
	The div_long_long_rem implementation in include/asm-x86/div64.h in the Linux kernel before 2.6.26 on the x86 platform allows local users to cause a denial of service (Divide Error Fault and panic) via a clock_gettime system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 04c790b378855fb45cf8fbe69ba4bbc1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072709" comment="kernel-bigsmp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072718" comment="kernel-kdumppae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072719" comment="kernel-vmi less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072720" comment="kernel-vmipae less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072715" comment="kernel-xenpae less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2a1dcec5842ef47d7b0bf7d89db4e205 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072721" comment="kernel-iseries64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072722" comment="kernel-ppc64 less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- 2a3c70bd23d91ad0dd11094f7e71f27a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072711" comment="kernel-smp less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072717" comment="kernel-kdump less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072714" comment="kernel-xen less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 57b7ee6bf27fb9015ddecedf2ed4e847 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072723" comment="kernel-default less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072724" comment="kernel-source less than 2.6.16.60-0.95.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072725" comment="kernel-syms less than 2.6.16.60-0.95.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ed1ddae1d04fbafa3e5bdc6898982285 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072710" comment="kernel-default less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072712" comment="kernel-source less than 2.6.16.60-0.93.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072713" comment="kernel-syms less than 2.6.16.60-0.93.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072716" comment="kernel-debug less than 2.6.16.60-0.93.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3210</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3210" source="CVE"/>
	<description>
	The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8r and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages from clients, which allows remote attackers to cause a denial of service (daemon crash) via out-of-order messages that violate the TLS protocol.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 26444e33feac9a88f912bd97ed6d7e48 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071475" comment="openssl-32bit less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071476" comment="openssl-64bit less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071477" comment="openssl-devel-32bit less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071478" comment="openssl-devel-64bit less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071479" comment="openssl-devel less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071480" comment="openssl-doc less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071481" comment="openssl-x86 less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071482" comment="openssl less than 0.9.8a-18.45.49.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071475" comment="openssl-32bit less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071477" comment="openssl-devel-32bit less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071479" comment="openssl-devel less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071480" comment="openssl-doc less than 0.9.8a-18.45.49.8"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071482" comment="openssl less than 0.9.8a-18.45.49.8"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071480" comment="openssl-doc less than 0.9.8a-18.45.49.8"/>
		</criteria></criteria>
	<!-- 95241db7d2f893a33f49b39d32a6f403 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071484" comment="openssl-32bit less than 0.9.8a-18.54.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071488" comment="openssl-64bit less than 0.9.8a-18.54.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071485" comment="openssl-devel-32bit less than 0.9.8a-18.54.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071489" comment="openssl-devel-64bit less than 0.9.8a-18.54.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071486" comment="openssl-devel less than 0.9.8a-18.54.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071490" comment="openssl-doc less than 0.9.8a-18.54.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071491" comment="openssl-x86 less than 0.9.8a-18.54.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071487" comment="openssl less than 0.9.8a-18.54.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071490" comment="openssl-doc less than 0.9.8a-18.54.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3256</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3256" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3256" source="CVE"/>
	<description>
	FreeType 2 before 2.4.7, as used in CoreGraphics in Apple iOS before 5, Mandriva Enterprise Server 5, and possibly other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font, a different vulnerability than CVE-2011-0226.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 7e775f10b0282368905503b130ebadf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072149" comment="freetype2-32bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072153" comment="freetype2-64bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072150" comment="freetype2-devel-32bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072154" comment="freetype2-devel-64bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072151" comment="freetype2-devel less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072155" comment="freetype2-x86 less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072152" comment="freetype2 less than 2.1.10-18.27.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3266</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3266" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3266" source="CVE"/>
	<description>
	The proto_tree_add_item function in Wireshark 1.6.0 through 1.6.1 and 1.4.0 through 1.4.8, when the IKEv1 protocol dissector is used, allows user-assisted remote attackers to cause a denial of service (infinite loop) via vectors involving a malformed IKE packet and many items in a tree.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- 566da20a8a85d82c440c7080cf808642 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071945" comment="wireshark less than 1.4.10-0.40.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3323</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3323" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3323" source="CVE"/>
	<description>
	The OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (out-of-bounds memory access and daemon crash) via a Link State Update message with an invalid IPv6 prefix length.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- cd3c1bf2e33f25c0bb1223847e6a9013 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
	<!-- f7777ccc3793cd9932158dd2361c840a -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3324</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3324" source="CVE"/>
	<description>
	The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- cd3c1bf2e33f25c0bb1223847e6a9013 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
	<!-- f7777ccc3793cd9932158dd2361c840a -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3325</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3325" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3325" source="CVE"/>
	<description>
	ospf_packet.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via (1) a 0x0a type field in an IPv4 packet header or (2) a truncated IPv4 Hello packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- cd3c1bf2e33f25c0bb1223847e6a9013 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
	<!-- f7777ccc3793cd9932158dd2361c840a -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3326</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3326" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3326" source="CVE"/>
	<description>
	The ospf_flood function in ospf_flood.c in ospfd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) via an invalid Link State Advertisement (LSA) type in an IPv4 Link State Update message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- cd3c1bf2e33f25c0bb1223847e6a9013 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
	<!-- f7777ccc3793cd9932158dd2361c840a -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3327</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3327" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3327" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ecommunity_ecom2str function in bgp_ecommunity.c in bgpd in Quagga before 0.99.19 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code by sending a crafted BGP UPDATE message over IPv4.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6a2ce9a129c2bd0589ccd9eea1208c09 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104371" comment="quagga-devel less than 0.99.9-14.7.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104372" comment="quagga less than 0.99.9-14.7.5.1"/>
		</criteria>
	</criteria>
	<!-- cd3c1bf2e33f25c0bb1223847e6a9013 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
	<!-- f7777ccc3793cd9932158dd2361c840a -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009070598" comment="quagga-devel less than 0.99.9-14.11.9"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009070599" comment="quagga less than 0.99.9-14.11.9"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3348</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-3348" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3348" source="CVE"/>
	<description>
	The mod_proxy_ajp module in the Apache HTTP Server before 2.2.21, when used with mod_proxy_balancer in certain configurations, allows remote attackers to cause a denial of service (temporary "error state" in the backend server) via a malformed HTTP request.
	</description>
 </metadata>
<!-- 9df41a2f243057be246685d2d329cdf9 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072233" comment="apache2-devel less than 2.2.3-16.42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072234" comment="apache2-doc less than 2.2.3-16.42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072235" comment="apache2-example-pages less than 2.2.3-16.42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072236" comment="apache2-prefork less than 2.2.3-16.42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072237" comment="apache2-worker less than 2.2.3-16.42.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072238" comment="apache2 less than 2.2.3-16.42.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3360</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3360" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3360" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3363</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3363" source="CVE"/>
	<description>
	The setup_cifs_sb function in fs/cifs/connect.c in the Linux kernel before 2.6.39 does not properly handle DFS referrals, which allows remote CIFS servers to cause a denial of service (system crash) by placing a referral at the root of a share.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 169bd714365eb7c38e38540921171d06 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 6253a90635c740c154fb5e3cc64612f2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071616" comment="kernel-bigsmp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071621" comment="kernel-kdumppae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071622" comment="kernel-vmi less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071623" comment="kernel-vmipae less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071619" comment="kernel-xenpae less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- b1201574824e860419470a1e97bdba2c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
		</criteria>
	</criteria>
	<!-- be6b41cc85222e68513448b61b7af786 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071617" comment="kernel-smp less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071612" comment="kernel-debug less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071618" comment="kernel-xen less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c4377326fa8f6c8c833ef411e531a291 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071613" comment="kernel-default less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071624" comment="kernel-iseries64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071625" comment="kernel-ppc64 less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071614" comment="kernel-source less than 2.6.16.60-0.91.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071615" comment="kernel-syms less than 2.6.16.60-0.91.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071620" comment="kernel-kdump less than 2.6.16.60-0.91.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3368</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368" source="CVE"/>
	<description>
	The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- 93f3f0fb2aeae6252ba07a3f17184bb0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104365" comment="apache2-devel less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104366" comment="apache2-doc less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104367" comment="apache2-example-pages less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104368" comment="apache2-prefork less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104369" comment="apache2-worker less than 2.2.3-16.32.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104370" comment="apache2 less than 2.2.3-16.32.37.1"/>
		</criteria>
	</criteria>
	<!-- 9df41a2f243057be246685d2d329cdf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072233" comment="apache2-devel less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072234" comment="apache2-doc less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072235" comment="apache2-example-pages less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072236" comment="apache2-prefork less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072237" comment="apache2-worker less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072238" comment="apache2 less than 2.2.3-16.42.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3372</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3372" source="CVE"/>
	<description>
	imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28e65de03508e79fd298d92f374f12bb -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071591" comment="cyrus-imapd-devel less than 2.2.12-27.16.32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071592" comment="cyrus-imapd less than 2.2.12-27.16.32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071593" comment="perl-Cyrus-IMAP less than 2.2.12-27.16.32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071594" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.16.32.2"/>
		</criteria>
	</criteria>
	<!-- d35c62e2f3af7034919109fa2658db92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071599" comment="cyrus-imapd-devel less than 2.2.12-27.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071600" comment="cyrus-imapd less than 2.2.12-27.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071601" comment="perl-Cyrus-IMAP less than 2.2.12-27.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071602" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.30.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3378</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3378" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378" source="CVE"/>
	<description>
	RPM 4.4.x through 4.9.x, probably before 4.9.1.2, allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via an rpm package with crafted headers and offsets that are not properly handled when a package is queried or installed, related to (1) the regionSwab function, (2) the headerLoad function, and (3) multiple functions in rpmio/rpmpgp.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37cdbd497da1d0ad591becda0c89a5b0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071673" comment="popt-32bit less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071674" comment="popt-64bit less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071675" comment="popt-devel-32bit less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071676" comment="popt-devel-64bit less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071677" comment="popt-devel less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071678" comment="popt-x86 less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071679" comment="popt less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071680" comment="rpm-devel less than 4.4.2-43.38.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071681" comment="rpm-python less than 4.4.2-43.38.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071682" comment="rpm less than 4.4.2-43.38.38.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071673" comment="popt-32bit less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071675" comment="popt-devel-32bit less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071677" comment="popt-devel less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071679" comment="popt less than 1.7-271.37.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071680" comment="rpm-devel less than 4.4.2-43.38.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071681" comment="rpm-python less than 4.4.2-43.38.38.7"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071682" comment="rpm less than 4.4.2-43.38.38.7"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071680" comment="rpm-devel less than 4.4.2-43.38.38.7"/>
		</criteria></criteria>
	<!-- 66be1106fa91062647ce6393c302fb4f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071683" comment="popt-32bit less than 1.7-271.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071690" comment="popt-64bit less than 1.7-271.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071684" comment="popt-devel-32bit less than 1.7-271.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071691" comment="popt-devel-64bit less than 1.7-271.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071685" comment="popt-devel less than 1.7-271.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071692" comment="popt-x86 less than 1.7-271.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071686" comment="popt less than 1.7-271.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071687" comment="rpm-devel less than 4.4.2-43.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071688" comment="rpm-python less than 4.4.2-43.42.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071689" comment="rpm less than 4.4.2-43.42.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071687" comment="rpm-devel less than 4.4.2-43.42.2"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3389</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3389" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389" source="CVE"/>
	<description>
	The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 8974c7b68cc0e0a4cf5b7453bd266343 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072886" comment="curl-32bit less than 7.15.1-19.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072889" comment="curl-64bit less than 7.15.1-19.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072887" comment="curl-devel less than 7.15.1-19.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072890" comment="curl-x86 less than 7.15.1-19.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072888" comment="curl less than 7.15.1-19.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072887" comment="curl-devel less than 7.15.1-19.20.1"/>
		</criteria></criteria>
	<!-- 8cae90c294b192a41f5e7816dbad3991 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073858" comment="python-32bit less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073865" comment="python-64bit less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073859" comment="python-curses less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073866" comment="python-demo less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073860" comment="python-devel less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073867" comment="python-doc-pdf less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073868" comment="python-doc less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073861" comment="python-gdbm less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073869" comment="python-idle less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073862" comment="python-tk less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073870" comment="python-x86 less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073863" comment="python-xml less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073864" comment="python less than 2.4.2-18.41.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073866" comment="python-demo less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073860" comment="python-devel less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073867" comment="python-doc-pdf less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073868" comment="python-doc less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073869" comment="python-idle less than 2.4.2-18.41.2"/>
			</criteria>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3439</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3439" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3439" source="CVE"/>
	<description>
	FreeType in CoreGraphics in Apple iOS before 5.0.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 7e775f10b0282368905503b130ebadf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072149" comment="freetype2-32bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072153" comment="freetype2-64bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072150" comment="freetype2-devel-32bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072154" comment="freetype2-devel-64bit less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072151" comment="freetype2-devel less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072155" comment="freetype2-x86 less than 2.1.10-18.27.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072152" comment="freetype2 less than 2.1.10-18.27.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3481</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3481" source="CVE"/>
	<description>
	The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 28e65de03508e79fd298d92f374f12bb -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071591" comment="cyrus-imapd-devel less than 2.2.12-27.16.32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071592" comment="cyrus-imapd less than 2.2.12-27.16.32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071593" comment="perl-Cyrus-IMAP less than 2.2.12-27.16.32.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071594" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.16.32.2"/>
		</criteria>
	</criteria>
	<!-- d35c62e2f3af7034919109fa2658db92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071599" comment="cyrus-imapd-devel less than 2.2.12-27.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071600" comment="cyrus-imapd less than 2.2.12-27.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071601" comment="perl-Cyrus-IMAP less than 2.2.12-27.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071602" comment="perl-Cyrus-SIEVE-managesieve less than 2.2.12-27.30.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3483</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3483" source="CVE"/>
	<description>
	Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a "buffer exception handling vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13b99038b2c69f173725463aedab01b3 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
	<!-- cf5c1e76f2a91730535608d0e7a92adc -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071189" comment="wireshark less than 1.4.4-0.41.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071188" comment="wireshark-devel less than 1.4.4-0.41.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3516</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3516" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, when running on Windows, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3521</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3521" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE, 7, 6 Update 27 and earlier, and 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3544</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3544" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7 and 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3545</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3545" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- f4937ae002dcdee7a337098f0e17f715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072098" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072109" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072099" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072100" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072102" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072103" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072104" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072105" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072106" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072108" comment="java-1_5_0-ibm less than 1.5.0_sr13.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3546</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3546" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3547" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- f4937ae002dcdee7a337098f0e17f715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072098" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072109" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072099" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072100" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072102" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072103" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072104" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072105" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072106" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072108" comment="java-1_5_0-ibm less than 1.5.0_sr13.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3548</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3548" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- f4937ae002dcdee7a337098f0e17f715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072098" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072109" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072099" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072100" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072102" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072103" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072104" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072105" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072106" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072108" comment="java-1_5_0-ibm less than 1.5.0_sr13.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3549" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- f4937ae002dcdee7a337098f0e17f715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072098" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072109" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072099" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072100" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072102" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072103" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072104" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072105" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072106" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072108" comment="java-1_5_0-ibm less than 1.5.0_sr13.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3550" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3552</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3552" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote attackers to affect integrity via unknown vectors related to Networking.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- f4937ae002dcdee7a337098f0e17f715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072098" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072109" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072099" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072100" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072102" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072103" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072104" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072105" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072106" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072108" comment="java-1_5_0-ibm less than 1.5.0_sr13.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3553</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3553" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3553" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JRockit R28.1.4 and earlier allows remote authenticated users to affect confidentiality, related to JAXWS.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3554</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3554" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- f4937ae002dcdee7a337098f0e17f715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072098" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072109" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072099" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072100" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072102" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072103" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072104" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072105" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072106" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072108" comment="java-1_5_0-ibm less than 1.5.0_sr13.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3556</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3556" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3557.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3557</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, 1.4.2_33 and earlier, and JRockit R28.1.4 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to RMI, a different vulnerability than CVE-2011-3556.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- f4937ae002dcdee7a337098f0e17f715 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072098" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072109" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072099" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072100" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072102" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072103" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072104" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072105" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072106" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072108" comment="java-1_5_0-ibm less than 1.5.0_sr13.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3560" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 051986200790170b4eac52e27d1e7141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072726" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072727" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072728" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072729" comment="java-1_4_2-ibm less than 1.4.2_sr13.11-0.10.1"/>
		</criteria>
	</criteria>
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- ea376c01db551281b5801fde16acb03e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3561</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3561" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, and JavaFX 2.0 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- ea376c01db551281b5801fde16acb03e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072730" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072731" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072732" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072733" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072734" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072735" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072736" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072737" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072738" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072739" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.0-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072740" comment="java-1_6_0-ibm less than 1.6.0_sr10.0-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Sound.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 91410c4f201444d1c10815a8d2e98c88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074577" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074578" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074579" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074580" comment="java-1_4_2-ibm less than 1.4.2_sr13.12-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3594</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-3594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3594" source="CVE"/>
	<description>
	The g_markup_escape_text function in the SILC protocol plug-in in libpurple 2.10.0 and earlier, as used in Pidgin and possibly other products, allows remote attackers to cause a denial of service (crash) via invalid UTF-8 sequences that trigger use of invalid pointers and an out-of-bounds read, related to interactions with certain versions of glib2.
	</description>
 </metadata>
<!-- b2065553568c70babb437af6b08cc06e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009071816" comment="finch-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071813" comment="finch less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071817" comment="libpurple-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071814" comment="libpurple less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071818" comment="pidgin-devel less than 2.6.6-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071815" comment="pidgin less than 2.6.6-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3604</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3604" source="CVE"/>
	<description>
	The process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to cause a denial of service (stack-based buffer over-read and crash) via unspecified vectors.
	</description>
 </metadata>
<!-- 0f2e586f7e96e98bb598f7aaab7c565c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071871" comment="radvd less than 0.9-13.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3605</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3605" source="CVE"/>
	<description>
	The process_rs function in the router advertisement daemon (radvd) before 1.8.2, when UnicastOnly is enabled, allows remote attackers to cause a denial of service (temporary service hang) via a large number of ND_ROUTER_SOLICIT requests.
	</description>
 </metadata>
<!-- 0f2e586f7e96e98bb598f7aaab7c565c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009071871" comment="radvd less than 0.9-13.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3607</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3607" source="CVE"/>
	<description>
	Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- 9df41a2f243057be246685d2d329cdf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072233" comment="apache2-devel less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072234" comment="apache2-doc less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072235" comment="apache2-example-pages less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072236" comment="apache2-prefork less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072237" comment="apache2-worker less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072238" comment="apache2 less than 2.2.3-16.42.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113627" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3627</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise SDK 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server for SAP 10 SP3</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3627" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3627" source="CVE"/>
	<description>
	The bytecode engine in ClamAV before 0.97.3 allows remote attackers to cause a denial of service (crash) via vectors related to "recursion level" and (1) libclamav/bytecode.c and (2) libclamav/bytecode_api.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0a747dcd76a3bbf1d11ff1e34c2e10a5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071603" comment="clamav less than 0.97.3-0.5.1"/>
	</criteria>
	<!-- 57be6a25b644258c6d3562960b192bcc -->
	<criteria operator="AND">
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009057519" comment="sles10-sp3-sap is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-sdk is installed"/>
		</criteria>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071603" comment="clamav less than 0.97.3-0.5.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3639</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3639" source="CVE"/>
	<description>
	The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- 9df41a2f243057be246685d2d329cdf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072233" comment="apache2-devel less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072234" comment="apache2-doc less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072235" comment="apache2-example-pages less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072236" comment="apache2-prefork less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072237" comment="apache2-worker less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072238" comment="apache2 less than 2.2.3-16.42.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113647" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3647</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3647" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3647" source="CVE"/>
	<description>
	The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9702913279a83a089e38e9d764a8ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071955" comment="MozillaFirefox-translations less than 3.6.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071956" comment="MozillaFirefox less than 3.6.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071957" comment="mozilla-xulrunner192-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071958" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071959" comment="mozilla-xulrunner192-gnome less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071960" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071961" comment="mozilla-xulrunner192-translations less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071962" comment="mozilla-xulrunner192 less than 1.9.2.24-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071963" comment="MozillaFirefox-branding-upstream less than 3.6.24-0.5.1"/>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3648</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3648" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3648" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9702913279a83a089e38e9d764a8ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071955" comment="MozillaFirefox-translations less than 3.6.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071956" comment="MozillaFirefox less than 3.6.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071957" comment="mozilla-xulrunner192-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071958" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071959" comment="mozilla-xulrunner192-gnome less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071960" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071961" comment="mozilla-xulrunner192-translations less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071962" comment="mozilla-xulrunner192 less than 1.9.2.24-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071963" comment="MozillaFirefox-branding-upstream less than 3.6.24-0.5.1"/>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3649</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3649" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3649" source="CVE"/>
	<description>
	Mozilla Firefox 7.0 and Thunderbird 7.0, when the Direct2D (aka D2D) API is used on Windows in conjunction with the Azure graphics back-end, allow remote attackers to bypass the Same Origin Policy, and obtain sensitive image data from a different domain, by inserting this data into a canvas.  NOTE: this issue exists because of a CVE-2011-2986 regression.
	</description>
 </metadata>
<!-- d38a557341c2b284b12c5c1e21800a6d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3650</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3650" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3650" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a9702913279a83a089e38e9d764a8ce1 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071955" comment="MozillaFirefox-translations less than 3.6.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071956" comment="MozillaFirefox less than 3.6.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071957" comment="mozilla-xulrunner192-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071958" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071959" comment="mozilla-xulrunner192-gnome less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071960" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071961" comment="mozilla-xulrunner192-translations less than 1.9.2.24-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071962" comment="mozilla-xulrunner192 less than 1.9.2.24-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071963" comment="MozillaFirefox-branding-upstream less than 3.6.24-0.5.1"/>
		</criteria></criteria>
	<!-- d38a557341c2b284b12c5c1e21800a6d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113651" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3651</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3651" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3651" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- d38a557341c2b284b12c5c1e21800a6d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3653</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3653" source="CVE"/>
	<description>
	Mozilla Firefox before 8.0 and Thunderbird before 8.0 on Mac OS X do not properly interact with the GPU memory behavior of a certain driver for Intel integrated GPUs, which allows remote attackers to bypass the Same Origin Policy and read image data via vectors related to WebGL textures.
	</description>
 </metadata>
<!-- d38a557341c2b284b12c5c1e21800a6d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3655</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3655" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site.
	</description>
 </metadata>
<!-- d38a557341c2b284b12c5c1e21800a6d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071938" comment="mozilla-nss-32bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071942" comment="mozilla-nss-64bit less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071939" comment="mozilla-nss-devel less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071943" comment="mozilla-nss-x86 less than 3.13.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071941" comment="mozilla-nss less than 3.13.1-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071940" comment="mozilla-nss-tools less than 3.13.1-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3659</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3659" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3659" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes.
	</description>
 </metadata>
<!-- d1ff5a0e9707cb73c751a65b6759427d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072905" comment="MozillaFirefox-translations less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072906" comment="MozillaFirefox less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072907" comment="mozilla-xulrunner192-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072908" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072909" comment="mozilla-xulrunner192-gnome less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072910" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072911" comment="mozilla-xulrunner192-translations less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072912" comment="mozilla-xulrunner192 less than 1.9.2.26-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072913" comment="MozillaFirefox-branding-upstream less than 3.6.26-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3670</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3670" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3670" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages.
	</description>
 </metadata>
<!-- d1ff5a0e9707cb73c751a65b6759427d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072905" comment="MozillaFirefox-translations less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072906" comment="MozillaFirefox less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072907" comment="mozilla-xulrunner192-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072908" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072909" comment="mozilla-xulrunner192-gnome less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072910" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072911" comment="mozilla-xulrunner192-translations less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072912" comment="mozilla-xulrunner192 less than 1.9.2.26-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072913" comment="MozillaFirefox-branding-upstream less than 3.6.26-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3919</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3919" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3919" source="CVE"/>
	<description>
	Heap-based buffer overflow in libxml2, as used in Google Chrome before 16.0.912.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2a9a16773f62000d9967a5742f785534 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072741" comment="libxml2-32bit less than 2.6.23-15.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072745" comment="libxml2-64bit less than 2.6.23-15.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072742" comment="libxml2-devel-32bit less than 2.6.23-15.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072746" comment="libxml2-devel-64bit less than 2.6.23-15.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072743" comment="libxml2-devel less than 2.6.23-15.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072747" comment="libxml2-x86 less than 2.6.23-15.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072744" comment="libxml2 less than 2.6.23-15.27.1"/>
		</criteria>
	</criteria>
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20113970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-3970</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3970" source="CVE"/>
	<description>
	libxslt, as used in Google Chrome before 17.0.963.46, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4e6a2ff81c440983e4a78087fc7ea548 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
	<!-- 5d3a5dffd02556b10dd8725a25b362d4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073438" comment="libxslt-32bit less than 1.1.15-15.16.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073442" comment="libxslt-64bit less than 1.1.15-15.16.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073439" comment="libxslt-devel-32bit less than 1.1.15-15.16.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073443" comment="libxslt-devel-64bit less than 1.1.15-15.16.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073440" comment="libxslt-devel less than 1.1.15-15.16.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073444" comment="libxslt-x86 less than 1.1.15-15.16.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073441" comment="libxslt less than 1.1.15-15.16.21"/>
		</criteria>
	</criteria>
	<!-- 8f27549488997eeff15597ab0b7a9c1a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4073</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4073" source="CVE"/>
	<description>
	Use-after-free vulnerability in the cryptographic helper handler functionality in Openswan 2.3.0 through 2.6.36 allows remote authenticated users to cause a denial of service (pluto IKE daemon crash) via vectors related to the (1) quick_outI1_continue and (2) quick_outI1 functions.
	</description>
 </metadata>
<!-- e88a8cd0f4ff74d83d293387eb09a0f8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072185" comment="openswan less than 2.4.4-18.19.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4077</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4077" source="CVE"/>
	<description>
	Buffer overflow in the xfs_readlink function in fs/xfs/xfs_vnodeops.c in XFS in the Linux kernel 2.6, when CONFIG_XFS_DEBUG is disabled, allows local users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an XFS image containing a symbolic link with a long pathname.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3395803e5857d3e0f44b39331dc3b010 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107340" comment="kernel-bigsmp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107342" comment="kernel-kdumppae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107343" comment="kernel-vmi less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107344" comment="kernel-vmipae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 74169532cbeb6a34c2168ce4ce202dbf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- 96d47125b6fb737bee4bf3f7619aa63d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9fe1c1f891de7bb8b0abad73549e497a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074617" comment="kernel-iseries64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074618" comment="kernel-ppc64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- d66830daf8e6d37d2c64dfa779e3a77d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4101</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4101" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4101" source="CVE"/>
	<description>
	The dissect_infiniband_common function in epan/dissectors/packet-infiniband.c in the Infiniband dissector in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 566da20a8a85d82c440c7080cf808642 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071945" comment="wireshark less than 1.4.10-0.40.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4102</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4102" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4102" source="CVE"/>
	<description>
	Heap-based buffer overflow in the erf_read_header function in wiretap/erf.c in the ERF file parser in Wireshark 1.4.0 through 1.4.9 and 1.6.x before 1.6.3 allows remote attackers to cause a denial of service (application crash) via a malformed file.
	</description>
 </metadata>
<!-- 566da20a8a85d82c440c7080cf808642 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071945" comment="wireshark less than 1.4.10-0.40.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009071946" comment="wireshark-devel less than 1.4.10-0.40.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4108</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4108" source="CVE"/>
	<description>
	The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16f27ddd5506ebb38dc0015501b071d9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072501" comment="openssl-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072505" comment="openssl-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072502" comment="openssl-devel-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072506" comment="openssl-devel-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072503" comment="openssl-devel less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072508" comment="openssl-x86 less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072504" comment="openssl less than 0.9.8a-18.56.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
		</criteria></criteria>
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4109</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4109" source="CVE"/>
	<description>
	Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16f27ddd5506ebb38dc0015501b071d9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072501" comment="openssl-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072505" comment="openssl-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072502" comment="openssl-devel-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072506" comment="openssl-devel-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072503" comment="openssl-devel less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072508" comment="openssl-x86 less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072504" comment="openssl less than 0.9.8a-18.56.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
		</criteria></criteria>
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4110</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4110" source="CVE"/>
	<description>
	The user_update function in security/keys/user_defined.c in the Linux kernel 2.6 allows local users to cause a denial of service (NULL pointer dereference and kernel oops) via vectors related to a user-defined key and "updating a negative key into a fully instantiated key."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4127</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4127" source="CVE"/>
	<description>
	The Linux kernel before 3.2.2 does not properly restrict SG_IO ioctl calls, which allows local users to bypass intended restrictions on disk read and write operations by sending a SCSI command to (1) a partition block device or (2) an LVM volume.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4132</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4132" source="CVE"/>
	<description>
	The cleanup_journal_tail function in the Journaling Block Device (JBD) functionality in the Linux kernel 2.6 allows local users to cause a denial of service (assertion error and kernel oops) via an ext3 or ext4 image with an "invalid log first block value."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4153</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4153" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4153" source="CVE"/>
	<description>
	PHP 5.3.8 does not always check the return value of the zend_strndup function, which might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted input to an application that performs strndup operations on untrusted string data, as demonstrated by the define function in zend_builtin_functions.c, and unspecified functions in ext/soap/php_sdl.c, ext/standard/syslog.c, ext/standard/browscap.c, ext/oci8/oci8.c, ext/com_dotnet/com_typeinfo.c, and main/php_open_temporary_file.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4182" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- e1ff0acb7870582081808201b27ba00e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072925" comment="sysconfig less than 0.50.9-13.68.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4313</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4313" source="CVE"/>
	<description>
	query.c in ISC BIND 9.0.x through 9.6.x, 9.4-ESV through 9.4-ESV-R5, 9.6-ESV through 9.6-ESV-R5, 9.7.0 through 9.7.4, 9.8.0 through 9.8.1, and 9.9.0a1 through 9.9.0b1 allows remote attackers to cause a denial of service (assertion failure and named exit) via unknown vectors related to recursive DNS queries, error logging, and the caching of an invalid record by the resolver.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0c80fc3c343491f7eb7e6bc404ef7f33 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071981" comment="bind-chrootenv less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071982" comment="bind-devel-64bit less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071983" comment="bind-devel less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071984" comment="bind-doc less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071978" comment="bind-libs-32bit less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071985" comment="bind-libs-64bit less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071986" comment="bind-libs-x86 less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071979" comment="bind-libs less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071980" comment="bind-utils less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071987" comment="bind less than 9.6ESVR5P1-0.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009071981" comment="bind-chrootenv less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071982" comment="bind-devel-64bit less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071983" comment="bind-devel less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071984" comment="bind-doc less than 9.6ESVR5P1-0.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009071987" comment="bind less than 9.6ESVR5P1-0.9.1"/>
			</criteria>
		</criteria></criteria>
	<!-- bf741f83685683458e4f1b5a8c453c92 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104429" comment="bind-chrootenv less than 9.3.4-1.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104430" comment="bind-devel less than 9.3.4-1.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104431" comment="bind-doc less than 9.3.4-1.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104432" comment="bind-libs-32bit less than 9.3.4-1.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104433" comment="bind-libs less than 9.3.4-1.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104434" comment="bind-utils less than 9.3.4-1.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104435" comment="bind less than 9.3.4-1.34.1"/>
		</criteria>
	</criteria>
	<!-- f33939df45afd911a3f5c222f6b62f24 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104436" comment="bind-chrootenv less than 9.3.4-1.31.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104437" comment="bind-devel less than 9.3.4-1.31.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104438" comment="bind-doc less than 9.3.4-1.31.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104439" comment="bind-libs-32bit less than 9.3.4-1.31.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104440" comment="bind-libs less than 9.3.4-1.31.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104441" comment="bind-utils less than 9.3.4-1.31.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104442" comment="bind less than 9.3.4-1.31.29.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4317</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4317" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317" source="CVE"/>
	<description>
	The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- 9df41a2f243057be246685d2d329cdf9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072233" comment="apache2-devel less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072234" comment="apache2-doc less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072235" comment="apache2-example-pages less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072236" comment="apache2-prefork less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072237" comment="apache2-worker less than 2.2.3-16.42.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072238" comment="apache2 less than 2.2.3-16.42.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4324</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4324" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4324" source="CVE"/>
	<description>
	The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3395803e5857d3e0f44b39331dc3b010 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107340" comment="kernel-bigsmp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107342" comment="kernel-kdumppae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107343" comment="kernel-vmi less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107344" comment="kernel-vmipae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 74169532cbeb6a34c2168ce4ce202dbf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- 96d47125b6fb737bee4bf3f7619aa63d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9fe1c1f891de7bb8b0abad73549e497a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074617" comment="kernel-iseries64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074618" comment="kernel-ppc64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- d66830daf8e6d37d2c64dfa779e3a77d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4330</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4330" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4330" source="CVE"/>
	<description>
	Stack-based buffer overflow in the hfs_mac2asc function in fs/hfs/trans.c in the Linux kernel 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via an HFS image with a crafted len field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3395803e5857d3e0f44b39331dc3b010 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107340" comment="kernel-bigsmp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107342" comment="kernel-kdumppae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107343" comment="kernel-vmi less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107344" comment="kernel-vmipae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 74169532cbeb6a34c2168ce4ce202dbf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- 96d47125b6fb737bee4bf3f7619aa63d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9fe1c1f891de7bb8b0abad73549e497a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074617" comment="kernel-iseries64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074618" comment="kernel-ppc64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- d66830daf8e6d37d2c64dfa779e3a77d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4345</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-4345" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4345" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Namazu before 2.0.21, when Internet Explorer 6 or 7 is used, allows remote attackers to inject arbitrary web script or HTML via a cookie.
	</description>
 </metadata>
<!-- 54ebd621e72f41f2f28b51ed5373ea16 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072262" comment="namazu less than 2.0.18-24.6.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4362</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-4362" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4362" source="CVE"/>
	<description>
	Integer signedness error in the base64_decode function in the HTTP authentication functionality (http_auth.c) in lighttpd 1.4 before 1.4.30 and 1.5 before SVN revision 2806 allows remote attackers to cause a denial of service (segmentation fault) via crafted base64 input that triggers an out-of-bounds read with a negative index.
	</description>
 </metadata>
<!-- decaee57a60c2feafab04139c68dd658 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072940" comment="lighttpd-mod_cml less than 1.4.10-11.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072941" comment="lighttpd-mod_mysql_vhost less than 1.4.10-11.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072942" comment="lighttpd-mod_rrdtool less than 1.4.10-11.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072943" comment="lighttpd-mod_trigger_b4_dl less than 1.4.10-11.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072944" comment="lighttpd-mod_webdav less than 1.4.10-11.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072945" comment="lighttpd less than 1.4.10-11.32.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4516</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4516" source="CVE"/>
	<description>
	Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a coding style default (COD) marker segment in a JPEG2000 file.
	</description>
 </metadata>
<!-- c5664f2672cb6f6b5193e1ba5d5c6638 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072256" comment="jasper less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072254" comment="libjasper-32bit less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072257" comment="libjasper-64bit less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072258" comment="libjasper-x86 less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072255" comment="libjasper less than 1.701.0-16.15.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072256" comment="jasper less than 1.701.0-16.15.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4517</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4517" source="CVE"/>
	<description>
	The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a crafted component registration (CRG) marker segment in a JPEG2000 file.
	</description>
 </metadata>
<!-- c5664f2672cb6f6b5193e1ba5d5c6638 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072256" comment="jasper less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072254" comment="libjasper-32bit less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072257" comment="libjasper-64bit less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072258" comment="libjasper-x86 less than 1.701.0-16.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072255" comment="libjasper less than 1.701.0-16.15.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072256" comment="jasper less than 1.701.0-16.15.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4566</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4566" source="CVE"/>
	<description>
	Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708.
	</description>
 </metadata>
<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4576</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4576" source="CVE"/>
	<description>
	The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16f27ddd5506ebb38dc0015501b071d9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072501" comment="openssl-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072505" comment="openssl-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072502" comment="openssl-devel-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072506" comment="openssl-devel-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072503" comment="openssl-devel less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072508" comment="openssl-x86 less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072504" comment="openssl less than 0.9.8a-18.56.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
		</criteria></criteria>
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4577</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4577" source="CVE"/>
	<description>
	OpenSSL before 0.9.8s and 1.x before 1.0.0f, when RFC 3779 support is enabled, allows remote attackers to cause a denial of service (assertion failure) via an X.509 certificate containing certificate-extension data associated with (1) IP address blocks or (2) Autonomous System (AS) identifiers.
	</description>
 </metadata>
<!-- 16f27ddd5506ebb38dc0015501b071d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072501" comment="openssl-32bit less than 0.9.8a-18.56.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072505" comment="openssl-64bit less than 0.9.8a-18.56.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072502" comment="openssl-devel-32bit less than 0.9.8a-18.56.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072506" comment="openssl-devel-64bit less than 0.9.8a-18.56.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072503" comment="openssl-devel less than 0.9.8a-18.56.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072508" comment="openssl-x86 less than 0.9.8a-18.56.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072504" comment="openssl less than 0.9.8a-18.56.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4599</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4599" source="CVE"/>
	<description>
	Stack-based buffer overflow in the _canonicalize function in common/uloc.c in International Components for Unicode (ICU) before 49.1 allows remote attackers to execute arbitrary code via a crafted locale ID that is not properly handled during variant canonicalization.
	</description>
 </metadata>
<!-- 212ca99750b4a43554de347c255f56fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073401" comment="libreoffice-cs less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073403" comment="libreoffice-de less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073406" comment="libreoffice-es less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073408" comment="libreoffice-fr less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073409" comment="libreoffice-galleries less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073410" comment="libreoffice-gnome less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073413" comment="libreoffice-hu less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073414" comment="libreoffice-it less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073415" comment="libreoffice-ja less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073416" comment="libreoffice-kde less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073418" comment="libreoffice-mono less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073422" comment="libreoffice-pl less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073423" comment="libreoffice-pt-BR less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073425" comment="libreoffice-sk less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073428" comment="libreoffice-zh-CN less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073429" comment="libreoffice-zh-TW less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073431" comment="libreoffice less than 3.4.5.5-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4601</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-4601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4601" source="CVE"/>
	<description>
	family_feedbag.c in the oscar protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted (1) AIM or (2) ICQ message associated with buddy-list addition.
	</description>
 </metadata>
<!-- c8785ba000be7d63668dde38be66bd5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072461" comment="finch-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072458" comment="finch less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072462" comment="libpurple-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072459" comment="libpurple less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072463" comment="pidgin-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072460" comment="pidgin less than 2.6.6-0.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4602</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-4602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4602" source="CVE"/>
	<description>
	The XMPP protocol plugin in libpurple in Pidgin before 2.10.1 does not properly handle missing fields in (1) voice-chat and (2) video-chat stanzas, which allows remote attackers to cause a denial of service (application crash) via a crafted message.
	</description>
 </metadata>
<!-- c8785ba000be7d63668dde38be66bd5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072461" comment="finch-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072458" comment="finch less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072462" comment="libpurple-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072459" comment="libpurple less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072463" comment="pidgin-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072460" comment="pidgin less than 2.6.6-0.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4603</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-4603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4603" source="CVE"/>
	<description>
	The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594.
	</description>
 </metadata>
<!-- c8785ba000be7d63668dde38be66bd5b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072461" comment="finch-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072458" comment="finch less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072462" comment="libpurple-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072459" comment="libpurple less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072463" comment="pidgin-devel less than 2.6.6-0.12.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072460" comment="pidgin less than 2.6.6-0.12.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4619</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4619" source="CVE"/>
	<description>
	The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service (CPU consumption) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 16f27ddd5506ebb38dc0015501b071d9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072501" comment="openssl-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072505" comment="openssl-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072502" comment="openssl-devel-32bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072506" comment="openssl-devel-64bit less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072503" comment="openssl-devel less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072508" comment="openssl-x86 less than 0.9.8a-18.56.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072504" comment="openssl less than 0.9.8a-18.56.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072507" comment="openssl-doc less than 0.9.8a-18.56.3"/>
		</criteria></criteria>
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4858</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4858" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4858" source="CVE"/>
	<description>
	Apache Tomcat before 5.5.35, 6.x before 6.0.35, and 7.x before 7.0.23 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
	</description>
 </metadata>
<!-- db53da1f9bc372bf81229767487059b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072946" comment="tomcat5-admin-webapps less than 5.5.27-0.18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072947" comment="tomcat5-webapps less than 5.5.27-0.18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072948" comment="tomcat5 less than 5.5.27-0.18.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4862</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4862" source="CVE"/>
	<description>
	Buffer overflow in libtelnet/encrypt.c in telnetd in FreeBSD 7.3 through 9.0, MIT Kerberos Version 5 Applications (aka krb5-appl) 1.0.2 and earlier, Heimdal 1.5.1 and earlier, GNU inetutils, and possibly other products allows remote attackers to execute arbitrary code via a long encryption key, as exploited in the wild in December 2011.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1827558e7c86f395bb141c5095dca72d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072356" comment="krb5-32bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072361" comment="krb5-64bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072362" comment="krb5-apps-clients less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072363" comment="krb5-apps-servers less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072357" comment="krb5-client less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072358" comment="krb5-devel-32bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072364" comment="krb5-devel-64bit less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072359" comment="krb5-devel less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072365" comment="krb5-server less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072366" comment="krb5-x86 less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072360" comment="krb5 less than 1.4.3-19.49.49.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072362" comment="krb5-apps-clients less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072363" comment="krb5-apps-servers less than 1.4.3-19.49.49.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072365" comment="krb5-server less than 1.4.3-19.49.49.1"/>
			</criteria>
		</criteria></criteria>
	<!-- af1f89f792c1b454611bd0a8d2dd9462 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072356" comment="krb5-32bit less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072362" comment="krb5-apps-clients less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072363" comment="krb5-apps-servers less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072357" comment="krb5-client less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072358" comment="krb5-devel-32bit less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072359" comment="krb5-devel less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072365" comment="krb5-server less than 1.4.3-19.49.49.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072360" comment="krb5 less than 1.4.3-19.49.49.1"/>
		</criteria>
	</criteria>
	<!-- c6533e0368b2b223506fedc65580c4ce -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104351" comment="krb5-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104352" comment="krb5-apps-clients less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104353" comment="krb5-apps-servers less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104354" comment="krb5-client less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104355" comment="krb5-devel-32bit less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104356" comment="krb5-devel less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104357" comment="krb5-server less than 1.4.3-19.43.37.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104358" comment="krb5 less than 1.4.3-19.43.37.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4885</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-4885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4885" source="CVE"/>
	<description>
	PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4913</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-4913" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4913" source="CVE"/>
	<description>
	The rose_parse_ccitt function in net/rose/rose_subr.c in the Linux kernel before 2.6.39 does not validate the FAC_CCITT_DEST_NSAP and FAC_CCITT_SRC_NSAP fields, which allows remote attackers to (1) cause a denial of service (integer underflow, heap memory corruption, and panic) via a small length value in data sent to a ROSE socket, or (2) conduct stack-based buffer overflow attacks via a large length value in data sent to a ROSE socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20114914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-4914</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2011-4914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4914" source="CVE"/>
	<description>
	The ROSE protocol implementation in the Linux kernel before 2.6.39 does not verify that certain data-length values are consistent with the amount of data sent, which might allow remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) via crafted data to a ROSE socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5000</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-5000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5000" source="CVE"/>
	<description>
	The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field.  NOTE: there may be limited scenarios in which this issue is relevant.
	</description>
 </metadata>
<!-- 1433a415c626f2bfb25c692b714ebf1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075431" comment="openssh-askpass less than 5.1p1-41.12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075432" comment="openssh less than 5.1p1-41.12.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20115035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2011-5035</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2011-5035" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-5035" source="CVE"/>
	<description>
	Oracle Glassfish 2.1.1, 3.0.1, and 3.1.1, as used in Communications Server 2.0, Sun Java System Application Server 8.1 and 8.2, and possibly other products, computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters, aka Oracle security ticket S0104869.
	</description>
 </metadata>
<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-0021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0021" source="CVE"/>
	<description>
	The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a %{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value.
	</description>
 </metadata>
<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0022</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-0022" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0022" source="CVE"/>
	<description>
	Apache Tomcat 5.5.x before 5.5.35, 6.x before 6.0.34, and 7.x before 7.0.23 uses an inefficient approach for handling parameters, which allows remote attackers to cause a denial of service (CPU consumption) via a request that contains many parameters and parameter values, a different vulnerability than CVE-2011-4858.
	</description>
 </metadata>
<!-- db53da1f9bc372bf81229767487059b1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009072946" comment="tomcat5-admin-webapps less than 5.5.27-0.18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072947" comment="tomcat5-webapps less than 5.5.27-0.18.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009072948" comment="tomcat5 less than 5.5.27-0.18.4"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0031</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0031" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0031" source="CVE"/>
	<description>
	scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e0c99b5795cd7497ef910246faba28d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073121" comment="apache2-devel less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073122" comment="apache2-doc less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073123" comment="apache2-example-pages less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073124" comment="apache2-prefork less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073125" comment="apache2-worker less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073126" comment="apache2 less than 2.2.3-16.44.1"/>
		</criteria>
	</criteria>
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0037</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-0037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0037" source="CVE"/>
	<description>
	Redland Raptor (aka libraptor) before 2.0.7, as used by OpenOffice 3.3 and 3.4 Beta, LibreOffice before 3.4.6 and 3.5.x before 3.5.1, and other products, allows user-assisted remote attackers to read arbitrary files via a crafted XML external entity (XXE) declaration and reference in an RDF document.
	</description>
 </metadata>
<!-- 212ca99750b4a43554de347c255f56fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073401" comment="libreoffice-cs less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073403" comment="libreoffice-de less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073406" comment="libreoffice-es less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073408" comment="libreoffice-fr less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073409" comment="libreoffice-galleries less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073410" comment="libreoffice-gnome less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073413" comment="libreoffice-hu less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073414" comment="libreoffice-it less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073415" comment="libreoffice-ja less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073416" comment="libreoffice-kde less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073418" comment="libreoffice-mono less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073422" comment="libreoffice-pl less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073423" comment="libreoffice-pt-BR less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073425" comment="libreoffice-sk less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073428" comment="libreoffice-zh-CN less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073429" comment="libreoffice-zh-TW less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073431" comment="libreoffice less than 3.4.5.5-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0041</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0041" source="CVE"/>
	<description>
	The dissect_packet function in epan/packet.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a capture file, as demonstrated by an airopeek file.
	</description>
 </metadata>
<!-- 0f46263d00a0a835ae8b455b8d0c12d8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073022" comment="wireshark less than 1.4.11-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0042</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0042" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0042" source="CVE"/>
	<description>
	Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 does not properly perform certain string conversions, which allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted packet, related to epan/to_str.c.
	</description>
 </metadata>
<!-- 0f46263d00a0a835ae8b455b8d0c12d8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073022" comment="wireshark less than 1.4.11-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0043</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0043" source="CVE"/>
	<description>
	Buffer overflow in the reassemble_message function in epan/dissectors/packet-rlc.c in the RLC dissector in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a series of fragmented RLC packets.
	</description>
 </metadata>
<!-- 0f46263d00a0a835ae8b455b8d0c12d8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073022" comment="wireshark less than 1.4.11-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0050</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0050" source="CVE"/>
	<description>
	OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service (crash) via unspecified vectors related to an out-of-bounds read.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
	<!-- f865d7708d91915ffe224375f1620a18 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073005" comment="openssl-32bit less than 0.9.8a-18.60.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073009" comment="openssl-64bit less than 0.9.8a-18.60.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073006" comment="openssl-devel-32bit less than 0.9.8a-18.60.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073010" comment="openssl-devel-64bit less than 0.9.8a-18.60.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073007" comment="openssl-devel less than 0.9.8a-18.60.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073011" comment="openssl-doc less than 0.9.8a-18.60.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073012" comment="openssl-x86 less than 0.9.8a-18.60.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073008" comment="openssl less than 0.9.8a-18.60.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073011" comment="openssl-doc less than 0.9.8a-18.60.3"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0053</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0053" source="CVE"/>
	<description>
	protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e0c99b5795cd7497ef910246faba28d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073121" comment="apache2-devel less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073122" comment="apache2-doc less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073123" comment="apache2-example-pages less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073124" comment="apache2-prefork less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073125" comment="apache2-worker less than 2.2.3-16.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073126" comment="apache2 less than 2.2.3-16.44.1"/>
		</criteria>
	</criteria>
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0057</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0057" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0057" source="CVE"/>
	<description>
	PHP before 5.3.9 has improper libxslt security settings, which allows remote attackers to create arbitrary files via a crafted XSLT stylesheet that uses the libxslt output extension.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0060</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0060" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0060" source="CVE"/>
	<description>
	RPM before 4.9.1.3 does not properly validate region tags, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an invalid region tag in a package header to the (1) headerLoad, (2) rpmReadSignature, or (3) headerVerify function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3437ad480e640b7bf5a09b96d1218988 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074260" comment="popt-devel less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074261" comment="popt less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074263" comment="rpm-python less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074264" comment="rpm less than 4.4.2-43.46.16"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
		</criteria></criteria>
	<!-- 61f3188b3d9e4127f71a5e83882d65ea -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074258" comment="popt-32bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074265" comment="popt-64bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074259" comment="popt-devel-32bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074266" comment="popt-devel-64bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074260" comment="popt-devel less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074267" comment="popt-x86 less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074261" comment="popt less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074263" comment="rpm-python less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074264" comment="rpm less than 4.4.2-43.46.16"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
		</criteria></criteria>
	<!-- c95eac3fb537ad2e271b549a1dd78add -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104443" comment="popt-32bit less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104444" comment="popt-devel-32bit less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104445" comment="popt-devel less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104446" comment="popt less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104447" comment="rpm-devel less than 4.4.2-43.38.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104448" comment="rpm-python less than 4.4.2-43.38.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104449" comment="rpm less than 4.4.2-43.38.42.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0061</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0061" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0061" source="CVE"/>
	<description>
	The headerLoad function in lib/header.c in RPM before 4.9.1.3 does not properly validate region tags, which allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a large region size in a package header.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3437ad480e640b7bf5a09b96d1218988 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074260" comment="popt-devel less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074261" comment="popt less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074263" comment="rpm-python less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074264" comment="rpm less than 4.4.2-43.46.16"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
		</criteria></criteria>
	<!-- 61f3188b3d9e4127f71a5e83882d65ea -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074258" comment="popt-32bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074265" comment="popt-64bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074259" comment="popt-devel-32bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074266" comment="popt-devel-64bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074260" comment="popt-devel less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074267" comment="popt-x86 less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074261" comment="popt less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074263" comment="rpm-python less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074264" comment="rpm less than 4.4.2-43.46.16"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
		</criteria></criteria>
	<!-- c95eac3fb537ad2e271b549a1dd78add -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104443" comment="popt-32bit less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104444" comment="popt-devel-32bit less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104445" comment="popt-devel less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104446" comment="popt less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104447" comment="rpm-devel less than 4.4.2-43.38.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104448" comment="rpm-python less than 4.4.2-43.38.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104449" comment="rpm less than 4.4.2-43.38.42.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0066</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0066" source="CVE"/>
	<description>
	Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in a (1) Accellent 5Views (aka .5vw) file, (2) I4B trace file, or (3) NETMON 2 capture file.
	</description>
 </metadata>
<!-- 0f46263d00a0a835ae8b455b8d0c12d8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073022" comment="wireshark less than 1.4.11-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0067</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0067" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0067" source="CVE"/>
	<description>
	wiretap/iptrace.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a long packet in an AIX iptrace file.
	</description>
 </metadata>
<!-- 0f46263d00a0a835ae8b455b8d0c12d8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073022" comment="wireshark less than 1.4.11-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0068</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0068" source="CVE"/>
	<description>
	The lanalyzer_read function in wiretap/lanalyzer.c in Wireshark 1.4.x before 1.4.11 and 1.6.x before 1.6.5 allows remote attackers to cause a denial of service (application crash) via a Novell capture file containing a record that is too small.
	</description>
 </metadata>
<!-- 0f46263d00a0a835ae8b455b8d0c12d8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073022" comment="wireshark less than 1.4.11-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073023" comment="wireshark-devel less than 1.4.11-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0217</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217" source="CVE"/>
	<description>
	The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a canonical address, which allows local users to gain privileges via a crafted application.  NOTE: because this issue is due to incorrect use of the Intel specification, it should have been split into separate identifiers; however, there was some value in preserving the original mapping of the multi-codebase coordinated-disclosure effort to a single identifier.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1fd339d2b48672edeccbed4bd3b9dd9d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104450" comment="xen-devel less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104451" comment="xen-doc-html less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104452" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104453" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104454" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104455" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104456" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104457" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104458" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104459" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104460" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104461" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104462" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104463" comment="xen-libs less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104464" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104465" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104466" comment="xen-tools less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104467" comment="xen less than 3.2.3_17040_28-0.6.11.1"/>
		</criteria>
	</criteria>
	<!-- bbca71d17e042f39532a8e3060358202 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104468" comment="xen-devel less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104469" comment="xen-doc-html less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104470" comment="xen-doc-pdf less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104471" comment="xen-doc-ps less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104472" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104473" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104474" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104475" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104476" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104477" comment="xen-libs-32bit less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104478" comment="xen-libs less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104479" comment="xen-tools-domU less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104480" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104481" comment="xen-tools less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104482" comment="xen less than 3.2.0_16718_26-0.8.1"/>
		</criteria>
	</criteria>
	<!-- c25fa3090bc865a8836ebaff073cd9b6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074544" comment="xen-devel less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074545" comment="xen-doc-html less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074546" comment="xen-doc-pdf less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074547" comment="xen-doc-ps less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074548" comment="xen-kmp-bigsmp less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074557" comment="xen-kmp-debug less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074549" comment="xen-kmp-default less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074558" comment="xen-kmp-kdump less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074559" comment="xen-kmp-kdumppae less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074550" comment="xen-kmp-smp less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074560" comment="xen-kmp-vmi less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074561" comment="xen-kmp-vmipae less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074551" comment="xen-libs-32bit less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074552" comment="xen-libs less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074553" comment="xen-tools-domU less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074554" comment="xen-tools-ioemu less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074555" comment="xen-tools less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074556" comment="xen less than 3.2.3_17040_38-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074544" comment="xen-devel less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074557" comment="xen-kmp-debug less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074558" comment="xen-kmp-kdump less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074551" comment="xen-libs-32bit less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074552" comment="xen-libs less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074554" comment="xen-tools-ioemu less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074555" comment="xen-tools less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074556" comment="xen less than 3.2.3_17040_38-0.11.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0218</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218" source="CVE"/>
	<description>
	Xen 3.4, 4.0, and 4.1, when the guest OS has not registered a handler for a syscall or sysenter instruction, does not properly clear a flag for exception injection when injecting a General Protection Fault, which allows local PV guest OS users to cause a denial of service (guest crash) by later triggering an exception that would normally be handled within Xen.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1fd339d2b48672edeccbed4bd3b9dd9d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104450" comment="xen-devel less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104451" comment="xen-doc-html less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104452" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104453" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104454" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104455" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104456" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104457" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104458" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104459" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104460" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104461" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104462" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104463" comment="xen-libs less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104464" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104465" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104466" comment="xen-tools less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104467" comment="xen less than 3.2.3_17040_28-0.6.11.1"/>
		</criteria>
	</criteria>
	<!-- bbca71d17e042f39532a8e3060358202 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104468" comment="xen-devel less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104469" comment="xen-doc-html less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104470" comment="xen-doc-pdf less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104471" comment="xen-doc-ps less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104472" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104473" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104474" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104475" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104476" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104477" comment="xen-libs-32bit less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104478" comment="xen-libs less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104479" comment="xen-tools-domU less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104480" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104481" comment="xen-tools less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104482" comment="xen less than 3.2.0_16718_26-0.8.1"/>
		</criteria>
	</criteria>
	<!-- c25fa3090bc865a8836ebaff073cd9b6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074544" comment="xen-devel less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074545" comment="xen-doc-html less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074546" comment="xen-doc-pdf less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074547" comment="xen-doc-ps less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074548" comment="xen-kmp-bigsmp less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074557" comment="xen-kmp-debug less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074549" comment="xen-kmp-default less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074558" comment="xen-kmp-kdump less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074559" comment="xen-kmp-kdumppae less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074550" comment="xen-kmp-smp less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074560" comment="xen-kmp-vmi less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074561" comment="xen-kmp-vmipae less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074551" comment="xen-libs-32bit less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074552" comment="xen-libs less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074553" comment="xen-tools-domU less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074554" comment="xen-tools-ioemu less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074555" comment="xen-tools less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074556" comment="xen less than 3.2.3_17040_38-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074544" comment="xen-devel less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074557" comment="xen-kmp-debug less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074558" comment="xen-kmp-kdump less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074551" comment="xen-libs-32bit less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074552" comment="xen-libs less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074554" comment="xen-tools-ioemu less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074555" comment="xen-tools less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074556" comment="xen less than 3.2.3_17040_38-0.11.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0219</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0219" source="CVE"/>
	<description>
	Heap-based buffer overflow in the xioscan_readline function in xio-readline.c in socat 1.4.0.0 through 1.7.2.0 and 2.0.0-b1 through 2.0.0-b4 allows local users to execute arbitrary code via the READLINE address.
	</description>
 </metadata>
<!-- 26d6956b5e38b37b8fb00575dde970ba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074797" comment="socat less than 1.7.0.0-1.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120247" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0247</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-0247" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0247" source="CVE"/>
	<description>
	ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset and count values in the ResolutionUnit tag in the EXIF IFD0 of an image.
	</description>
 </metadata>
<!-- 73ca451abc4b60d47f7346db66e99f9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074682" comment="ImageMagick-Magick++-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074678" comment="ImageMagick-Magick++ less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074679" comment="ImageMagick-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074680" comment="ImageMagick less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074681" comment="perl-PerlMagick less than 6.2.5-16.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0248</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-0248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0248" source="CVE"/>
	<description>
	ImageMagick 6.7.5-7 and earlier allows remote attackers to cause a denial of service (infinite loop and hang) via a crafted image whose IFD contains IOP tags that all reference the beginning of the IDF.
	</description>
 </metadata>
<!-- 73ca451abc4b60d47f7346db66e99f9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074682" comment="ImageMagick-Magick++-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074678" comment="ImageMagick-Magick++ less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074679" comment="ImageMagick-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074680" comment="ImageMagick less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074681" comment="perl-PerlMagick less than 6.2.5-16.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0249</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0249" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0249" source="CVE"/>
	<description>
	Buffer overflow in the ospf_ls_upd_list_lsa function in ospf_packet.c in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a Link State Update (aka LS Update) packet that is smaller than the length specified in its header.
	</description>
 </metadata>
<!-- 9bef93966149baad96780e499beb1fec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074405" comment="quagga-devel less than 0.99.9-14.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074406" comment="quagga less than 0.99.9-14.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0250</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0250" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0250" source="CVE"/>
	<description>
	Buffer overflow in the OSPFv2 implementation in ospfd in Quagga before 0.99.20.1 allows remote attackers to cause a denial of service (daemon crash) via a Link State Update (aka LS Update) packet containing a network-LSA link-state advertisement for which the data-structure length is smaller than the value in the Length header field.
	</description>
 </metadata>
<!-- 9bef93966149baad96780e499beb1fec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074405" comment="quagga-devel less than 0.99.9-14.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074406" comment="quagga less than 0.99.9-14.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0255</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0255" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0255" source="CVE"/>
	<description>
	The BGP implementation in bgpd in Quagga before 0.99.20.1 does not properly use message buffers for OPEN messages, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a message associated with a malformed Four-octet AS Number Capability (aka AS4 capability).
	</description>
 </metadata>
<!-- 9bef93966149baad96780e499beb1fec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074405" comment="quagga-devel less than 0.99.9-14.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074406" comment="quagga less than 0.99.9-14.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0259</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-0259" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0259" source="CVE"/>
	<description>
	The GetEXIFProperty function in magick/property.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (crash) via a zero value in the component count of an EXIF XResolution tag in a JPEG file, which triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 73ca451abc4b60d47f7346db66e99f9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074682" comment="ImageMagick-Magick++-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074678" comment="ImageMagick-Magick++ less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074679" comment="ImageMagick-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074680" comment="ImageMagick less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074681" comment="perl-PerlMagick less than 6.2.5-16.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120260" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0260</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-0260" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0260" source="CVE"/>
	<description>
	The JPEGWarningHandler function in coders/jpeg.c in ImageMagick before 6.7.6-3 allows remote attackers to cause a denial of service (memory consumption) via a JPEG image with a crafted sequence of restart markers.
	</description>
 </metadata>
<!-- 73ca451abc4b60d47f7346db66e99f9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074682" comment="ImageMagick-Magick++-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074678" comment="ImageMagick-Magick++ less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074679" comment="ImageMagick-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074680" comment="ImageMagick less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074681" comment="perl-PerlMagick less than 6.2.5-16.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0390</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0390" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0390" source="CVE"/>
	<description>
	The DTLS implementation in GnuTLS 3.0.10 and earlier executes certain error-handling code only if there is a specific relationship between a padding length and the ciphertext size, which makes it easier for remote attackers to recover partial plaintext via a timing side-channel attack, a related issue to CVE-2011-4108.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- db5ce46e4686a3180984675829d5453e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074798" comment="gnutls-32bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074802" comment="gnutls-64bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074799" comment="gnutls-devel-32bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074803" comment="gnutls-devel-64bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074800" comment="gnutls-devel less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074804" comment="gnutls-x86 less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074801" comment="gnutls less than 1.2.10-13.30.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0427</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0427" source="CVE"/>
	<description>
	yast2-add-on-creator in SUSE inst-source-utils 2008.11.26 before 2008.11.26-0.9.1 and 2012.9.13 before 2012.9.13-0.8.1 allows local users to gain privileges via a crafted (1) file name or (2) directory name.
	</description>
 </metadata>
<!-- 37a5722f1fdf0e2643b80548de09976b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076088" comment="inst-source-utils less than 2008.11.26-0.9.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0441</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0441" source="CVE"/>
	<description>
	The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0442</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0442" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- d1ff5a0e9707cb73c751a65b6759427d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072905" comment="MozillaFirefox-translations less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072906" comment="MozillaFirefox less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072907" comment="mozilla-xulrunner192-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072908" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072909" comment="mozilla-xulrunner192-gnome less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072910" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072911" comment="mozilla-xulrunner192-translations less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072912" comment="mozilla-xulrunner192 less than 1.9.2.26-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072913" comment="MozillaFirefox-branding-upstream less than 3.6.26-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0444</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0444" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 56f02ce23b1f6abe181f7e00c3bc1f23 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073154" comment="libvorbis-32bit less than 1.1.2-13.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073157" comment="libvorbis-64bit less than 1.1.2-13.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073155" comment="libvorbis-devel less than 1.1.2-13.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073158" comment="libvorbis-x86 less than 1.1.2-13.19.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073156" comment="libvorbis less than 1.1.2-13.19.1"/>
		</criteria>
	</criteria>
	<!-- d1ff5a0e9707cb73c751a65b6759427d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009072905" comment="MozillaFirefox-translations less than 3.6.26-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072906" comment="MozillaFirefox less than 3.6.26-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072907" comment="mozilla-xulrunner192-32bit less than 1.9.2.26-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072908" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.26-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072909" comment="mozilla-xulrunner192-gnome less than 1.9.2.26-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072910" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.26-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072911" comment="mozilla-xulrunner192-translations less than 1.9.2.26-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072912" comment="mozilla-xulrunner192 less than 1.9.2.26-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009072913" comment="MozillaFirefox-branding-upstream less than 3.6.26-0.6.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0449</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0449" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed XSLT stylesheet that is embedded in a document.
	</description>
 </metadata>
<!-- d1ff5a0e9707cb73c751a65b6759427d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009072905" comment="MozillaFirefox-translations less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072906" comment="MozillaFirefox less than 3.6.26-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072907" comment="mozilla-xulrunner192-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072908" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072909" comment="mozilla-xulrunner192-gnome less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072910" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072911" comment="mozilla-xulrunner192-translations less than 1.9.2.26-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072912" comment="mozilla-xulrunner192 less than 1.9.2.26-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009072913" comment="MozillaFirefox-branding-upstream less than 3.6.26-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0455</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0455" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict drag-and-drop operations on javascript: URLs, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web page, related to a "DragAndDropJacking" issue.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0456</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0456" source="CVE"/>
	<description>
	The SVG Filters implementation in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to obtain sensitive information from process memory via vectors that trigger an out-of-bounds read.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0457</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0457" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsSMILTimeValueSpec::ConvertBetweenTimeContainer function in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 might allow remote attackers to execute arbitrary code via an SVG animation.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0458</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0458" source="CVE"/>
	<description>
	Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 do not properly restrict setting the home page through the dragging of a URL to the home button, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a javascript: URL that is later interpreted in the about:sessionrestore context.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0461</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0461" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0462</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0462" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0463</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0463" source="CVE"/>
	<description>
	The nsWindow implementation in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 does not check the validity of an instance after event dispatching, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, as demonstrated by Mobile Firefox on Android.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0464</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0464" source="CVE"/>
	<description>
	Use-after-free vulnerability in the browser engine in Mozilla Firefox before 3.6.28 and 4.x through 10.0, Firefox ESR 10.x before 10.0.3, Thunderbird before 3.1.20 and 5.0 through 10.0, Thunderbird ESR 10.x before 10.0.3, and SeaMonkey before 2.8 allows remote attackers to execute arbitrary code via vectors involving an empty argument to the array.join function in conjunction with the triggering of garbage collection.
	</description>
 </metadata>
<!-- 3cbbf6dfa64d498549bb143a54005d87 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073368" comment="MozillaFirefox-translations less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073369" comment="MozillaFirefox less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073370" comment="mozilla-nspr-32bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073383" comment="mozilla-nspr-64bit less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073371" comment="mozilla-nspr-devel less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073384" comment="mozilla-nspr-x86 less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073372" comment="mozilla-nspr less than 4.9.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073373" comment="mozilla-nss-32bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073385" comment="mozilla-nss-64bit less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073374" comment="mozilla-nss-devel less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073386" comment="mozilla-nss-x86 less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073376" comment="mozilla-nss less than 3.13.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073377" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073378" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073379" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073380" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073381" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073382" comment="mozilla-xulrunner192 less than 1.9.2.28-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073387" comment="MozillaFirefox-branding-upstream less than 3.6.28-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073375" comment="mozilla-nss-tools less than 3.13.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0467</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0467" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0468</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0468" source="CVE"/>
	<description>
	The browser engine in Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (assertion failure and memory corruption) or possibly execute arbitrary code via vectors related to jsval.h and the js::array_shift function.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0469</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0469" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozilla::dom::indexedDB::IDBKeyRange::cycleCollection::Trace function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to execute arbitrary code via vectors related to crafted IndexedDB data.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0470</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0470" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsSVGFEDiffuseLightingElement::LightPixel function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to cause a denial of service (invalid gfxImageSurface free operation) or possibly execute arbitrary code by leveraging the use of "different number systems."
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0471</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0471" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via a multibyte character set.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0472</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0472" source="CVE"/>
	<description>
	The cairo-dwrite implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9, when certain Windows Vista and Windows 7 configurations are used, does not properly restrict font-rendering attempts, which allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0473</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0473" source="CVE"/>
	<description>
	The WebGLBuffer::FindMaxUshortElement function in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 calls the FindMaxElementInSubArray function with incorrect template arguments, which allows remote attackers to obtain sensitive information from video memory via a crafted WebGL.drawElements call.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0474</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0474" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in the docshell implementation in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allows remote attackers to inject arbitrary web script or HTML via vectors related to short-circuited page loads, aka "Universal XSS (UXSS)."
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0475</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0475" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 11.0, Thunderbird 5.0 through 11.0, and SeaMonkey before 2.9 do not properly construct the Origin and Sec-WebSocket-Origin HTTP headers, which might allow remote attackers to bypass an IPv6 literal ACL via a cross-site (1) XMLHttpRequest or (2) WebSocket operation involving a nonstandard port number and an IPv6 address that contains certain zero fields.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0477</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0477" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0478</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0478" source="CVE"/>
	<description>
	The texImage2D implementation in the WebGL subsystem in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 does not properly restrict JSVAL_TO_OBJECT casts, which might allow remote attackers to execute arbitrary code via a crafted web page.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0479</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0479" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to spoof the address bar via an https URL for invalid (1) RSS or (2) Atom XML content.
	</description>
 </metadata>
<!-- f83092661fed82089220795937f323d2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074355" comment="MozillaFirefox-branding-SLED less than 7-0.8.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074356" comment="MozillaFirefox-translations less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074357" comment="MozillaFirefox less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074362" comment="firefox3-gtk2-32bit less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074363" comment="firefox3-gtk2 less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074365" comment="mozilla-nss-32bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074369" comment="mozilla-nss-64bit less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074366" comment="mozilla-nss-devel less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074370" comment="mozilla-nss-x86 less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074368" comment="mozilla-nss less than 3.13.4-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074371" comment="MozillaFirefox-branding-upstream less than 10.0.4-0.7.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074358" comment="beagle-evolution less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074359" comment="beagle-firefox less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074360" comment="beagle-gui less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074361" comment="beagle less than 0.2.18-78.13.1.102"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074372" comment="firefox3-autoconf261 less than 2.61-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074373" comment="firefox3-binutils less than 2.21.1-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074374" comment="firefox3-gtk2-devel less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074375" comment="firefox3-gtk2-doc less than 2.10.6-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074376" comment="firefox3-make less than 3.81-0.129.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074377" comment="firefox3-python-base less than 2.6.8-0.7.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074367" comment="mozilla-nss-tools less than 3.13.4-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074378" comment="yasm-devel less than 1.1.0-10.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074379" comment="yasm less than 1.1.0-10.5.5"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0497" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, and 6 Update 30 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0498" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0499</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0499" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier; and JavaFX 2.0.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 91410c4f201444d1c10815a8d2e98c88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074577" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074578" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074579" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074580" comment="java-1_4_2-ibm less than 1.4.2_sr13.12-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0500" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and JavaFX 2.0.2 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0501</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0501" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0502</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0502" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and availability, related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 91410c4f201444d1c10815a8d2e98c88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074577" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074578" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074579" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074580" comment="java-1_4_2-ibm less than 1.4.2_sr13.12-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0503</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0503" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to I18n.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 91410c4f201444d1c10815a8d2e98c88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074577" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074578" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074579" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074580" comment="java-1_4_2-ibm less than 1.4.2_sr13.12-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0505</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0505" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 91410c4f201444d1c10815a8d2e98c88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074577" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074578" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074579" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074580" comment="java-1_4_2-ibm less than 1.4.2_sr13.12-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0506</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0506" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, 5.0 Update 33 and earlier, and 1.4.2_35 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to CORBA.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 91410c4f201444d1c10815a8d2e98c88 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074577" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074578" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074579" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.12-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074580" comment="java-1_4_2-ibm less than 1.4.2_sr13.12-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0507</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0507" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 2 and earlier, 6 Update 30 and earlier, and 5.0 Update 33 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Concurrency.  NOTE: the previous information was obtained from the February 2012 Oracle CPU. Oracle has not commented on claims from a downstream vendor and third party researchers that this issue occurs because the AtomicReferenceArray class implementation does not ensure that the array is of the Object[] type, which allows attackers to cause a denial of service (JVM crash) or bypass Java sandbox restrictions.  NOTE: this issue was originally mapped to CVE-2011-3571, but that identifier was already assigned to a different issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37f9fa06a81529e81613e3989bd55358 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074166" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074177" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074167" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074168" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074170" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074171" comment="java-1_5_0-ibm-devel less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074172" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074173" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074174" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr13.1-0.8.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074176" comment="java-1_5_0-ibm less than 1.5.0_sr13.1-0.8.3"/>
		</criteria>
	</criteria>
	<!-- 3e69c82d3033515d0a8d556f0d82fee8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074178" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074179" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074180" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074181" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074182" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074183" comment="java-1_6_0-ibm-devel less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074184" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074185" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074186" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074187" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr10.1-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074188" comment="java-1_6_0-ibm less than 1.6.0_sr10.1-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0551" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE 7 update 4 and earlier and 6 update 32 and earlier, and the GlassFish Enterprise Server component in Oracle Sun Products Suite GlassFish Enterprise Server 3.1.1, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Web Container or Deployment.
	</description>
 </metadata>
<!-- 6c5cd876c149103233c3763ab3c16263 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0781</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0781" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0781" source="CVE"/>
	<description>
	The tidy_diagnose function in PHP 5.3.8 might allow remote attackers to cause a denial of service (NULL pointer dereference and application crash) via crafted input to an application that attempts to perform Tidy::diagnose operations on invalid objects, a different vulnerability than CVE-2011-4153.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0788</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0788" source="CVE"/>
	<description>
	The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service (application crash) via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0789</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0789" source="CVE"/>
	<description>
	Memory leak in the timezone functionality in PHP before 5.3.9 allows remote attackers to cause a denial of service (memory consumption) by triggering many strtotime function calls, which are not properly handled by the php_date_parse_tzfile cache.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0804</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0804" source="CVE"/>
	<description>
	Heap-based buffer overflow in the proxy_connect function in src/client.c in CVS 1.11 and 1.12 allows remote HTTP proxy servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted HTTP response.
	</description>
 </metadata>
<!-- 41ed9e2e2ddfbd6e10469d928edf5ba4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073110" comment="cvs-doc less than 1.12.12-19.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073109" comment="cvs less than 1.12.12-19.10.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073110" comment="cvs-doc less than 1.12.12-19.10.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0807</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0807" source="CVE"/>
	<description>
	Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in a Set-Cookie HTTP header.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0814</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0814" source="CVE"/>
	<description>
	The auth_parse_options function in auth-options.c in sshd in OpenSSH before 5.7 provides debug messages containing authorized_keys command options, which allows remote authenticated users to obtain potentially sensitive information by reading these messages, as demonstrated by the shared user account required by Gitolite.  NOTE: this can cross privilege boundaries because a user account may intentionally have no shell or filesystem access, and therefore may have no supported way to read an authorized_keys file in its own home directory.
	</description>
 </metadata>
<!-- 1433a415c626f2bfb25c692b714ebf1c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075431" comment="openssh-askpass less than 5.1p1-41.12.8"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075432" comment="openssh less than 5.1p1-41.12.8"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0815</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0815" source="CVE"/>
	<description>
	The headerVerifyInfo function in lib/header.c in RPM before 4.9.1.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a negative value in a region offset of a package header, which is not properly handled in a numeric range comparison.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3437ad480e640b7bf5a09b96d1218988 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074260" comment="popt-devel less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074261" comment="popt less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074263" comment="rpm-python less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074264" comment="rpm less than 4.4.2-43.46.16"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
		</criteria></criteria>
	<!-- 61f3188b3d9e4127f71a5e83882d65ea -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074258" comment="popt-32bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074265" comment="popt-64bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074259" comment="popt-devel-32bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074266" comment="popt-devel-64bit less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074260" comment="popt-devel less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074267" comment="popt-x86 less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074261" comment="popt less than 1.7-271.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074263" comment="rpm-python less than 4.4.2-43.46.16"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074264" comment="rpm less than 4.4.2-43.46.16"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074262" comment="rpm-devel less than 4.4.2-43.46.16"/>
		</criteria></criteria>
	<!-- c95eac3fb537ad2e271b549a1dd78add -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104443" comment="popt-32bit less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104444" comment="popt-devel-32bit less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104445" comment="popt-devel less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104446" comment="popt less than 1.7-271.37.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104447" comment="rpm-devel less than 4.4.2-43.38.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104448" comment="rpm-python less than 4.4.2-43.38.42.36"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104449" comment="rpm less than 4.4.2-43.38.42.36"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0830</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0830" source="CVE"/>
	<description>
	The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0831</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0831" source="CVE"/>
	<description>
	PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 12fa3ee1e0074dc69ed195ba32ed4339 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073321" comment="php5-json less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073302" comment="apache2-mod_php5 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073303" comment="php5-bcmath less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073304" comment="php5-bz2 less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073305" comment="php5-calendar less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073306" comment="php5-ctype less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073307" comment="php5-curl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073308" comment="php5-dba less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073309" comment="php5-dbase less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073310" comment="php5-devel less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073311" comment="php5-dom less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073312" comment="php5-exif less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073313" comment="php5-fastcgi less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073314" comment="php5-ftp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073315" comment="php5-gd less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073316" comment="php5-gettext less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073317" comment="php5-gmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073318" comment="php5-hash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073319" comment="php5-iconv less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073320" comment="php5-imap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073322" comment="php5-ldap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073323" comment="php5-mbstring less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073324" comment="php5-mcrypt less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073325" comment="php5-mhash less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073326" comment="php5-mysql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073327" comment="php5-ncurses less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073328" comment="php5-odbc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073329" comment="php5-openssl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073330" comment="php5-pcntl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073331" comment="php5-pdo less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073332" comment="php5-pear less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073333" comment="php5-pgsql less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073334" comment="php5-posix less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073335" comment="php5-pspell less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073336" comment="php5-shmop less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073337" comment="php5-snmp less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073338" comment="php5-soap less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073339" comment="php5-sockets less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073340" comment="php5-sqlite less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073341" comment="php5-suhosin less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073342" comment="php5-sysvmsg less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073343" comment="php5-sysvsem less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073344" comment="php5-sysvshm less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073351" comment="php5-tidy less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073345" comment="php5-tokenizer less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073346" comment="php5-wddx less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073347" comment="php5-xmlreader less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073348" comment="php5-xmlrpc less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073349" comment="php5-xsl less than 5.2.14-0.26.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073350" comment="php5-zlib less than 5.2.14-0.26.3"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0841</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0841" source="CVE"/>
	<description>
	libxml2 before 2.8.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted XML data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8710ea4a1a76636f485ed091d51d76c5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074274" comment="libxml2-32bit less than 2.6.23-15.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074278" comment="libxml2-64bit less than 2.6.23-15.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074275" comment="libxml2-devel-32bit less than 2.6.23-15.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074279" comment="libxml2-devel-64bit less than 2.6.23-15.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074276" comment="libxml2-devel less than 2.6.23-15.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074280" comment="libxml2-x86 less than 2.6.23-15.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074277" comment="libxml2 less than 2.6.23-15.29.1"/>
		</criteria>
	</criteria>
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0862</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0862" source="CVE"/>
	<description>
	builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02d02e7774b10b86c728bb88af735b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104483" comment="xinetd less than 2.3.14-14.12.1"/>
	</criteria>
	<!-- 697d9a5cda282587ef2ff61975bbcad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104483" comment="xinetd less than 2.3.14-14.12.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0864</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0864" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0864" source="CVE"/>
	<description>
	Integer overflow in the vfprintf function in stdio-common/vfprintf.c in glibc 2.14 and other versions allows context-dependent attackers to bypass the FORTIFY_SOURCE protection mechanism, conduct format string attacks, and write to arbitrary memory via a large number of arguments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17c15337eaf4f28f28cdc9f9d3d731ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104319" comment="glibc-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104320" comment="glibc-devel-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104321" comment="glibc-devel less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104322" comment="glibc-html less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104323" comment="glibc-i18ndata less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104324" comment="glibc-info less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104325" comment="glibc-locale-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104326" comment="glibc-locale less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104327" comment="glibc-profile-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104328" comment="glibc-profile less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104329" comment="glibc less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104330" comment="nscd less than 2.4-31.77.102.1"/>
		</criteria>
	</criteria>
	<!-- 54ed22b7fde76468f5f64a1f89cb1e8f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074036" comment="glibc-32bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074046" comment="glibc-64bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074037" comment="glibc-devel-32bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074047" comment="glibc-devel-64bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074038" comment="glibc-devel less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074039" comment="glibc-html less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074040" comment="glibc-i18ndata less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074041" comment="glibc-info less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074042" comment="glibc-locale-32bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074048" comment="glibc-locale-64bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074049" comment="glibc-locale-x86 less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074043" comment="glibc-locale less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074050" comment="glibc-profile-32bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074051" comment="glibc-profile-64bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074052" comment="glibc-profile-x86 less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074053" comment="glibc-profile less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074054" comment="glibc-x86 less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074044" comment="glibc less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074045" comment="nscd less than 2.4-31.101.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074055" comment="glibc-dceext-32bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074056" comment="glibc-dceext-64bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074057" comment="glibc-dceext-x86 less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074058" comment="glibc-dceext less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074039" comment="glibc-html less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074050" comment="glibc-profile-32bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074051" comment="glibc-profile-64bit less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074052" comment="glibc-profile-x86 less than 2.4-31.101.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074053" comment="glibc-profile less than 2.4-31.101.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0866</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0866" source="CVE"/>
	<description>
	CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
	</description>
 </metadata>
<!-- bb8dbe40ca6eb550de22331990660c8f -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074397" comment="postgresql-contrib less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074394" comment="postgresql-devel less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074398" comment="postgresql-docs less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074395" comment="postgresql-libs-32bit less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074399" comment="postgresql-libs-64bit less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074400" comment="postgresql-libs-x86 less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074396" comment="postgresql-libs less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074401" comment="postgresql-server less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074402" comment="postgresql less than 8.1.22-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074397" comment="postgresql-contrib less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074394" comment="postgresql-devel less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074398" comment="postgresql-docs less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074401" comment="postgresql-server less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074402" comment="postgresql less than 8.1.22-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0868</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0868" source="CVE"/>
	<description>
	CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
	</description>
 </metadata>
<!-- bb8dbe40ca6eb550de22331990660c8f -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074397" comment="postgresql-contrib less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074394" comment="postgresql-devel less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074398" comment="postgresql-docs less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074395" comment="postgresql-libs-32bit less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074399" comment="postgresql-libs-64bit less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074400" comment="postgresql-libs-x86 less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074396" comment="postgresql-libs less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074401" comment="postgresql-server less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074402" comment="postgresql less than 8.1.22-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074397" comment="postgresql-contrib less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074394" comment="postgresql-devel less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074398" comment="postgresql-docs less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074401" comment="postgresql-server less than 8.1.22-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074402" comment="postgresql less than 8.1.22-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0870</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0870" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0870" source="CVE"/>
	<description>
	Heap-based buffer overflow in process.c in smbd in Samba 3.0, as used in the file-sharing service on the BlackBerry PlayBook tablet before 2.0.0.7971 and other products, allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a Batched (aka AndX) request that triggers infinite recursion.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 547e3b7057adb631e1439605662293be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073205" comment="cifs-mount less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073206" comment="ldapsmb less than 1.34b-25.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073218" comment="libmsrpc-devel less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073219" comment="libmsrpc less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073207" comment="libsmbclient-32bit less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073208" comment="libsmbclient-devel less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073209" comment="libsmbclient less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073210" comment="samba-32bit less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073211" comment="samba-client-32bit less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073212" comment="samba-client less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073213" comment="samba-krb-printing less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073225" comment="samba-python less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073214" comment="samba-vscan less than 0.3.6b-43.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073215" comment="samba-winbind-32bit less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073216" comment="samba-winbind less than 3.0.36-0.13.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073217" comment="samba less than 3.0.36-0.13.18.1"/>
		</criteria>
	</criteria>
	<!-- 7647f10c23183441620c089dfae68cd9 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104335" comment="cifs-mount less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104336" comment="libmsrpc-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104337" comment="libmsrpc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104338" comment="libsmbclient-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104339" comment="libsmbclient-devel less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104340" comment="libsmbclient less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104341" comment="samba-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104342" comment="samba-client-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104343" comment="samba-client less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104344" comment="samba-doc less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104345" comment="samba-krb-printing less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104346" comment="samba-python less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104347" comment="samba-vscan less than 0.3.6b-42.85.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104348" comment="samba-winbind-32bit less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104349" comment="samba-winbind less than 3.0.32-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104350" comment="samba less than 3.0.32-0.20.1"/>
		</criteria>
	</criteria>
	<!-- 7da8ca4f10f91e5bf4d12b67b2bd7522 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073205" comment="cifs-mount less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073206" comment="ldapsmb less than 1.34b-25.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073218" comment="libmsrpc-devel less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073219" comment="libmsrpc less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073207" comment="libsmbclient-32bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073220" comment="libsmbclient-64bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073208" comment="libsmbclient-devel less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073221" comment="libsmbclient-x86 less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073209" comment="libsmbclient less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073210" comment="samba-32bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073222" comment="samba-64bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073211" comment="samba-client-32bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073223" comment="samba-client-64bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073224" comment="samba-client-x86 less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073212" comment="samba-client less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073213" comment="samba-krb-printing less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073225" comment="samba-python less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073214" comment="samba-vscan less than 0.3.6b-43.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073215" comment="samba-winbind-32bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073226" comment="samba-winbind-64bit less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073227" comment="samba-winbind-x86 less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073216" comment="samba-winbind less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073228" comment="samba-x86 less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073217" comment="samba less than 3.0.36-0.13.18.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073218" comment="libmsrpc-devel less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073219" comment="libmsrpc less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073208" comment="libsmbclient-devel less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073229" comment="libsmbsharemodes-devel less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073230" comment="libsmbsharemodes less than 3.0.36-0.13.18.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073225" comment="samba-python less than 3.0.36-0.13.18.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0876</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0876" source="CVE"/>
	<description>
	The XML parser (xmlparse.c) in expat before 2.1.0 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via an XML file with many identifiers with the same value.
	</description>
 </metadata>
<!-- 4a77c640139b9b5a7e5b29f40a1e6f95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074693" comment="expat-32bit less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074695" comment="expat-64bit less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074696" comment="expat-x86 less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074694" comment="expat less than 2.0.0-13.15.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20120883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-0883</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-0883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0883" source="CVE"/>
	<description>
	envvars (aka envvars-std) in the Apache HTTP Server before 2.4.2 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse DSO in the current working directory during execution of apachectl.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- f43eb058005728c7f0f35af643e86652 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076727" comment="apache2-devel less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076728" comment="apache2-doc less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076729" comment="apache2-example-pages less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076730" comment="apache2-prefork less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076731" comment="apache2-worker less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076732" comment="apache2 less than 2.2.3-16.46.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1108</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1108" source="CVE"/>
	<description>
	The parse function in ogg/xiphcomment.cpp in TagLib 1.7 and earlier allows remote attackers to cause a denial of service (crash) via a crafted vendorLength field in an ogg file.
	</description>
 </metadata>
<!-- cd82b6b35d24911b6b1aa3e62fbad07c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074620" comment="taglib-32bit less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074623" comment="taglib-64bit less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074621" comment="taglib-devel less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074624" comment="taglib-x86 less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074622" comment="taglib less than 1.4-20.8.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1126</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1126" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a BDF font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1127</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1127" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1127" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1129</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1129" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1129" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted SFNT string in a Type 42 font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1130</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1130" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1130" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted property data in a PCF font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1131</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1131" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, on 64-bit platforms allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors related to the cell table of a font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1132</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1132" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1132" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via crafted dictionary data in a Type 1 font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1133</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1133" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1133" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1134</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1134" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted private-dictionary data in a Type 1 font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1135</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1135" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1135" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the NPUSHB and NPUSHW instructions in a TrueType font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1136</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1136" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph or bitmap data in a BDF font that lacks an ENCODING field.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1137</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1137" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1137" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted header in a BDF font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1138</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1138" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via vectors involving the MIRP instruction in a TrueType font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1139</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1139" source="CVE"/>
	<description>
	Array index error in FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid stack read operation and memory corruption) or possibly execute arbitrary code via crafted glyph data in a BDF font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1141</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1141" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap read operation and memory corruption) or possibly execute arbitrary code via a crafted ASCII string in a BDF font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1142</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1142" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1142" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (invalid heap write operation and memory corruption) or possibly execute arbitrary code via crafted glyph-outline data in a font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1143</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1143" source="CVE"/>
	<description>
	FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1726216ecdcd5bf2aac95567fbb683f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073550" comment="freetype2-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073555" comment="freetype2-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073551" comment="freetype2-devel-32bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073556" comment="freetype2-devel-64bit less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073552" comment="freetype2-devel less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073557" comment="freetype2-x86 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073553" comment="freetype2 less than 2.1.10-18.29.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073554" comment="ft2demos less than 2.1.10-19.29.2"/>
		</criteria>
	</criteria>
	<!-- 7476e36b394db4aa52c01037bbfd62ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104373" comment="freetype2-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104374" comment="freetype2-devel-32bit less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104375" comment="freetype2-devel less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104376" comment="freetype2 less than 2.1.10-18.22.21.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104377" comment="ft2demos less than 2.1.10-19.18.21.7"/>
		</criteria>
	</criteria>
	<!-- 79a084c6d12b368701383076dee3e174 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104484" comment="freetype2-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104485" comment="freetype2-devel-32bit less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104486" comment="freetype2-devel less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104487" comment="freetype2 less than 2.1.10-18.29.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104488" comment="ft2demos less than 2.1.10-19.29.7"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1147</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1147" source="CVE"/>
	<description>
	readfilemap.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (file descriptor consumption) via a large number of crafted XML files.
	</description>
 </metadata>
<!-- 4a77c640139b9b5a7e5b29f40a1e6f95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074693" comment="expat-32bit less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074695" comment="expat-64bit less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074696" comment="expat-x86 less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074694" comment="expat less than 2.0.0-13.15.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1148</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1148" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1148" source="CVE"/>
	<description>
	Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
	</description>
 </metadata>
<!-- 4a77c640139b9b5a7e5b29f40a1e6f95 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074693" comment="expat-32bit less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074695" comment="expat-64bit less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074696" comment="expat-x86 less than 2.0.0-13.15.16"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074694" comment="expat less than 2.0.0-13.15.16"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1149</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-1149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1149" source="CVE"/>
	<description>
	Integer overflow in the vclmi.dll module in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted embedded image object, as demonstrated by a JPEG image in a .DOC file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 212ca99750b4a43554de347c255f56fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073401" comment="libreoffice-cs less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073403" comment="libreoffice-de less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073406" comment="libreoffice-es less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073408" comment="libreoffice-fr less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073409" comment="libreoffice-galleries less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073410" comment="libreoffice-gnome less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073413" comment="libreoffice-hu less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073414" comment="libreoffice-it less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073415" comment="libreoffice-ja less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073416" comment="libreoffice-kde less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073418" comment="libreoffice-mono less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073422" comment="libreoffice-pl less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073423" comment="libreoffice-pt-BR less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073425" comment="libreoffice-sk less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073428" comment="libreoffice-zh-CN less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073429" comment="libreoffice-zh-TW less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073431" comment="libreoffice less than 3.4.5.5-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1150</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1150" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1150" source="CVE"/>
	<description>
	Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8949716005409529da7f83d076b78ef7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075171" comment="apache2-mod_python less than 3.1.3-60.16.2"/>
	</criteria>
	<!-- 8cae90c294b192a41f5e7816dbad3991 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073858" comment="python-32bit less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073865" comment="python-64bit less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073859" comment="python-curses less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073866" comment="python-demo less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073860" comment="python-devel less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073867" comment="python-doc-pdf less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073868" comment="python-doc less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073861" comment="python-gdbm less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073869" comment="python-idle less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073862" comment="python-tk less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073870" comment="python-x86 less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073863" comment="python-xml less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073864" comment="python less than 2.4.2-18.41.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073866" comment="python-demo less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073860" comment="python-devel less than 2.4.2-18.41.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073867" comment="python-doc-pdf less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073868" comment="python-doc less than 2.4.2-18.41.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073869" comment="python-idle less than 2.4.2-18.41.2"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1151</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-1151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1151" source="CVE"/>
	<description>
	Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.
	</description>
 </metadata>
<!-- 24930e6a7dc80c0177ce9a6232051c1e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074785" comment="perl-DBD-Pg less than 1.43-13.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1165</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1165" source="CVE"/>
	<description>
	The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
	<!-- f6896f36048d7e8f3d49c12c286ae0d8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073451" comment="openssl-32bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073455" comment="openssl-64bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073452" comment="openssl-devel-32bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073456" comment="openssl-devel-64bit less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073453" comment="openssl-devel less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073457" comment="openssl-doc less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073458" comment="openssl-x86 less than 0.9.8a-18.64.3"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073454" comment="openssl less than 0.9.8a-18.64.3"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073457" comment="openssl-doc less than 0.9.8a-18.64.3"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1172</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1172" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1172" source="CVE"/>
	<description>
	The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 4c521fa4b1380a2123c60bdf8e191643 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074067" comment="apache2-mod_php5 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074068" comment="php5-bcmath less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074069" comment="php5-bz2 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074070" comment="php5-calendar less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074071" comment="php5-ctype less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074072" comment="php5-curl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074073" comment="php5-dba less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074074" comment="php5-dbase less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074075" comment="php5-devel less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074076" comment="php5-dom less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074077" comment="php5-exif less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074078" comment="php5-fastcgi less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074079" comment="php5-ftp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074080" comment="php5-gd less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074081" comment="php5-gettext less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074082" comment="php5-gmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074083" comment="php5-hash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074084" comment="php5-iconv less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074085" comment="php5-imap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074086" comment="php5-json less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074087" comment="php5-ldap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074088" comment="php5-mbstring less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074089" comment="php5-mcrypt less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074090" comment="php5-mhash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074091" comment="php5-mysql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074092" comment="php5-ncurses less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074093" comment="php5-odbc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074094" comment="php5-openssl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074095" comment="php5-pcntl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074096" comment="php5-pdo less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074097" comment="php5-pear less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074098" comment="php5-pgsql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074099" comment="php5-posix less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074100" comment="php5-pspell less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074101" comment="php5-shmop less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074102" comment="php5-snmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074103" comment="php5-soap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074104" comment="php5-sockets less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074105" comment="php5-sqlite less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074106" comment="php5-suhosin less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074107" comment="php5-sysvmsg less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074108" comment="php5-sysvsem less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074109" comment="php5-sysvshm less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074110" comment="php5-tokenizer less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074111" comment="php5-wddx less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074112" comment="php5-xmlreader less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074113" comment="php5-xmlrpc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074114" comment="php5-xsl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074115" comment="php5-zlib less than 5.2.14-0.32.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074067" comment="apache2-mod_php5 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074068" comment="php5-bcmath less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074069" comment="php5-bz2 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074070" comment="php5-calendar less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074071" comment="php5-ctype less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074072" comment="php5-curl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074073" comment="php5-dba less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074074" comment="php5-dbase less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074075" comment="php5-devel less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074076" comment="php5-dom less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074077" comment="php5-exif less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074078" comment="php5-fastcgi less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074079" comment="php5-ftp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074080" comment="php5-gd less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074081" comment="php5-gettext less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074082" comment="php5-gmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074083" comment="php5-hash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074084" comment="php5-iconv less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074085" comment="php5-imap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074087" comment="php5-ldap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074088" comment="php5-mbstring less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074089" comment="php5-mcrypt less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074090" comment="php5-mhash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074091" comment="php5-mysql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074092" comment="php5-ncurses less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074093" comment="php5-odbc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074094" comment="php5-openssl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074095" comment="php5-pcntl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074096" comment="php5-pdo less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074097" comment="php5-pear less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074098" comment="php5-pgsql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074099" comment="php5-posix less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074100" comment="php5-pspell less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074101" comment="php5-shmop less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074102" comment="php5-snmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074103" comment="php5-soap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074104" comment="php5-sockets less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074105" comment="php5-sqlite less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074106" comment="php5-suhosin less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074107" comment="php5-sysvmsg less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074108" comment="php5-sysvsem less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074109" comment="php5-sysvshm less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074116" comment="php5-tidy less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074110" comment="php5-tokenizer less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074111" comment="php5-wddx less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074112" comment="php5-xmlreader less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074113" comment="php5-xmlrpc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074114" comment="php5-xsl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074115" comment="php5-zlib less than 5.2.14-0.32.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1173</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1173" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1173" source="CVE"/>
	<description>
	Multiple integer overflows in tiff_getimage.c in LibTIFF 3.9.4 allow remote attackers to execute arbitrary code via a crafted tile size in a TIFF file, which is not properly handled by the (1) gtTileSeparate or (2) gtStripSeparate function, leading to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3c1e26e281f6488d70976e6d76893183 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073804" comment="libtiff-32bit less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073807" comment="libtiff-64bit less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073808" comment="libtiff-devel-32bit less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073809" comment="libtiff-devel-64bit less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073805" comment="libtiff-devel less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073810" comment="libtiff-x86 less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073806" comment="libtiff less than 3.8.2-5.26.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073808" comment="libtiff-devel-32bit less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073809" comment="libtiff-devel-64bit less than 3.8.2-5.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073805" comment="libtiff-devel less than 3.8.2-5.26.1"/>
			</criteria>
		</criteria></criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1178</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-1178" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1178" source="CVE"/>
	<description>
	The msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.2 allows remote servers to cause a denial of service (application crash) via an OIM message that lacks UTF-8 encoding.
	</description>
 </metadata>
<!-- 1444b130f542f9e056af8af62199bd10 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074701" comment="finch-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074698" comment="finch less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074702" comment="libpurple-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074699" comment="libpurple less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074703" comment="pidgin-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074700" comment="pidgin less than 2.6.6-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1182</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1182" source="CVE"/>
	<description>
	The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5b844721c4336f27fc2fd229115daaf1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104493" comment="cifs-mount less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104494" comment="libmsrpc-devel less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104495" comment="libmsrpc less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104496" comment="libsmbclient-32bit less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104497" comment="libsmbclient-devel less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104498" comment="libsmbclient less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104499" comment="samba-32bit less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104500" comment="samba-client-32bit less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104501" comment="samba-client less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104502" comment="samba-doc less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104503" comment="samba-krb-printing less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104504" comment="samba-python less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104505" comment="samba-vscan less than 0.3.6b-42.85.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104506" comment="samba-winbind-32bit less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104507" comment="samba-winbind less than 3.0.32-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104508" comment="samba less than 3.0.32-0.22.1"/>
		</criteria>
	</criteria>
	<!-- 62cd7ec87ad16e0edc0743bc15673759 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073646" comment="cifs-mount less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073647" comment="ldapsmb less than 1.34b-25.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073660" comment="libmsrpc-devel less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073661" comment="libmsrpc less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073648" comment="libsmbclient-32bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073662" comment="libsmbclient-64bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073649" comment="libsmbclient-devel less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073663" comment="libsmbclient-x86 less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073650" comment="libsmbclient less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073651" comment="samba-32bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073664" comment="samba-64bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073652" comment="samba-client-32bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073665" comment="samba-client-64bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073666" comment="samba-client-x86 less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073653" comment="samba-client less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073654" comment="samba-doc less than 3.0.36-0.12.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073655" comment="samba-krb-printing less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073667" comment="samba-python less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073656" comment="samba-vscan less than 0.3.6b-43.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073657" comment="samba-winbind-32bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073668" comment="samba-winbind-64bit less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073669" comment="samba-winbind-x86 less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073658" comment="samba-winbind less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073670" comment="samba-x86 less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073659" comment="samba less than 3.0.36-0.13.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009073660" comment="libmsrpc-devel less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073661" comment="libmsrpc less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073649" comment="libsmbclient-devel less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073671" comment="libsmbsharemodes-devel less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073672" comment="libsmbsharemodes less than 3.0.36-0.13.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009073667" comment="samba-python less than 3.0.36-0.13.20.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ddd29165a82cb06a9503d4d188911168 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073646" comment="cifs-mount less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073647" comment="ldapsmb less than 1.34b-25.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073660" comment="libmsrpc-devel less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073661" comment="libmsrpc less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073648" comment="libsmbclient-32bit less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073649" comment="libsmbclient-devel less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073650" comment="libsmbclient less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073651" comment="samba-32bit less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073652" comment="samba-client-32bit less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073653" comment="samba-client less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073654" comment="samba-doc less than 3.0.36-0.12.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073655" comment="samba-krb-printing less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073667" comment="samba-python less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073656" comment="samba-vscan less than 0.3.6b-43.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073657" comment="samba-winbind-32bit less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073658" comment="samba-winbind less than 3.0.36-0.13.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073659" comment="samba less than 3.0.36-0.13.20.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1185</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-1185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1185" source="CVE"/>
	<description>
	Multiple integer overflows in (1) magick/profile.c or (2) magick/property.c in ImageMagick 6.7.5 and earlier allow remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code via crafted offset value in the ResolutionUnit tag in the EXIF IFD0 of an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0247.
	</description>
 </metadata>
<!-- 73ca451abc4b60d47f7346db66e99f9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074682" comment="ImageMagick-Magick++-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074678" comment="ImageMagick-Magick++ less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074679" comment="ImageMagick-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074680" comment="ImageMagick less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074681" comment="perl-PerlMagick less than 6.2.5-16.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1186</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-1186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1186" source="CVE"/>
	<description>
	Integer overflow in the SyncImageProfiles function in profile.c in ImageMagick 6.7.5-8 and earlier allows remote attackers to cause a denial of service (infinite loop) via crafted IOP tag offsets in the IFD in an image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0248.
	</description>
 </metadata>
<!-- 73ca451abc4b60d47f7346db66e99f9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074682" comment="ImageMagick-Magick++-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074678" comment="ImageMagick-Magick++ less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074679" comment="ImageMagick-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074680" comment="ImageMagick less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074681" comment="perl-PerlMagick less than 6.2.5-16.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1457</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1457" source="CVE"/>
	<description>
	The TAR file parser in Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Emsisoft Anti-Malware 5.1.0.1, eSafe 7.0.17.0, F-Prot Antivirus 4.6.2.117, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field that exceeds the total TAR file size.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
	</description>
 </metadata>
<!-- 081f4d44356f37d28fa582731745c3e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074895" comment="clamav less than 0.97.5-0.5.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1458</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1458" source="CVE"/>
	<description>
	The Microsoft CHM file parser in ClamAV 0.96.4 and Sophos Anti-Virus 4.61.0 allows remote attackers to bypass malware detection via a crafted reset interval in the LZXC header of a CHM file.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different CHM parser implementations.
	</description>
 </metadata>
<!-- 081f4d44356f37d28fa582731745c3e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074895" comment="clamav less than 0.97.5-0.5.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1459</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1459" source="CVE"/>
	<description>
	The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, Avira AntiVir 7.11.1.163, Antiy Labs AVL SDK 2.0.3.7, avast! Antivirus 4.8.1351.0 and 5.0.677.0, AVG Anti-Virus 10.0.0.1190, Bitdefender 7.2, Quick Heal (aka Cat QuickHeal) 11.00, ClamAV 0.96.4, Command Antivirus 5.2.11.5, Comodo Antivirus 7424, Emsisoft Anti-Malware 5.1.0.1, F-Prot Antivirus 4.6.2.117, F-Secure Anti-Virus 9.0.16160.0, Fortinet Antivirus 4.2.254.0, G Data AntiVirus 21, Ikarus Virus Utilities T3 Command Line Scanner 1.1.97.0, Jiangmin Antivirus 13.0.900, K7 AntiVirus 9.77.3565, Kaspersky Anti-Virus 7.0.0.125, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, Antimalware Engine 1.1.6402.0 in Microsoft Security Essentials 2.0, NOD32 Antivirus 5795, Norman Antivirus 6.06.12, nProtect Anti-Virus 2011-01-17.01, Panda Antivirus 10.0.2.7, PC Tools AntiVirus 7.0.3.5, Rising Antivirus 22.83.00.03, Sophos Anti-Virus 4.61.0, AVEngine 20101.3.0.103 in Symantec Endpoint Protection 11, Trend Micro AntiVirus 9.120.0.1004, Trend Micro HouseCall 9.120.0.1004, VBA32 3.12.14.2, and VirusBuster 13.6.151.0 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry.  NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
	</description>
 </metadata>
<!-- 081f4d44356f37d28fa582731745c3e7 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074895" comment="clamav less than 0.97.5-0.5.2"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1502</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1502" source="CVE"/>
	<description>
	Double free vulnerability in the PyPAM_conv in PAMmodule.c in PyPam 0.5.0 and earlier allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a NULL byte in a password string.
	</description>
 </metadata>
<!-- 8b8603c07c14f3887dda36dda9c6534c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074314" comment="python-pam less than 0.5.0-2.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1531</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1531" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier; and JavaFX 2.2 and earlier; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- a01a06d8f691fbd19a4c84cccb9cd2f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076070" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076071" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076072" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076073" comment="java-1_4_2-ibm less than 1.4.2_sr13.14-0.5.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1532</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1532" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier and 6 Update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1533</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1533" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-3159.
	</description>
 </metadata>
<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1541" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from a third party that the issue is due to an interaction error in between the JRE plug-in for WebKit-based browsers and the Javascript engine, which allows remote attackers to execute arbitrary code by modifying DOM nodes that contain applet elements in a way that triggers an incorrect reference count and a use after free.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1569</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1569" source="CVE"/>
	<description>
	The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- db5ce46e4686a3180984675829d5453e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074798" comment="gnutls-32bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074802" comment="gnutls-64bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074799" comment="gnutls-devel-32bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074803" comment="gnutls-devel-64bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074800" comment="gnutls-devel less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074804" comment="gnutls-x86 less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074801" comment="gnutls less than 1.2.10-13.30.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1573</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1573" source="CVE"/>
	<description>
	gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- db5ce46e4686a3180984675829d5453e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074798" comment="gnutls-32bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074802" comment="gnutls-64bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074799" comment="gnutls-devel-32bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074803" comment="gnutls-devel-64bit less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074800" comment="gnutls-devel less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074804" comment="gnutls-x86 less than 1.2.10-13.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074801" comment="gnutls less than 1.2.10-13.30.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1584</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1584" source="CVE"/>
	<description>
	Integer overflow in the mid function in toolkit/tbytevector.cpp in TagLib 1.7 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a crafted file header field in a media file, which triggers a large memory allocation.
	</description>
 </metadata>
<!-- cd82b6b35d24911b6b1aa3e62fbad07c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074620" comment="taglib-32bit less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074623" comment="taglib-64bit less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074621" comment="taglib-devel less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074624" comment="taglib-x86 less than 1.4-20.8.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074622" comment="taglib less than 1.4-20.8.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1586</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1586" source="CVE"/>
	<description>
	mount.cifs in cifs-utils 2.6 allows local users to determine the existence of arbitrary files or directories via the file path in the second argument, which reveals their existence in an error message.
	</description>
 </metadata>
<!-- 1d50d01aa74b22f0c8645692c12273df -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076550" comment="cifs-mount less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076551" comment="ldapsmb less than 1.34b-25.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076589" comment="libmsrpc-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076590" comment="libmsrpc less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076552" comment="libsmbclient-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076591" comment="libsmbclient-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076553" comment="libsmbclient-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076592" comment="libsmbclient-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076554" comment="libsmbclient less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076555" comment="samba-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076593" comment="samba-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076556" comment="samba-client-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076594" comment="samba-client-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076595" comment="samba-client-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076557" comment="samba-client less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076558" comment="samba-doc less than 3.0.36-0.12.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076559" comment="samba-krb-printing less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076596" comment="samba-python less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076560" comment="samba-vscan less than 0.3.6b-43.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076561" comment="samba-winbind-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076597" comment="samba-winbind-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076598" comment="samba-winbind-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076562" comment="samba-winbind less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076599" comment="samba-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076563" comment="samba less than 3.0.36-0.13.24.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076589" comment="libmsrpc-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076590" comment="libmsrpc less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076553" comment="libsmbclient-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076600" comment="libsmbsharemodes-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076601" comment="libsmbsharemodes less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076596" comment="samba-python less than 3.0.36-0.13.24.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1593</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1593" source="CVE"/>
	<description>
	epan/dissectors/packet-ansi_a.c in the ANSI A dissector in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 23c9fd0f27644efe93d209c35cd2f52b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073963" comment="wireshark less than 1.4.12-0.5.6"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1594</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-1594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1594" source="CVE"/>
	<description>
	epan/dissectors/packet-ieee80211.c in the IEEE 802.11 dissector in Wireshark 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (infinite loop) via a crafted packet.
	</description>
 </metadata>
<!-- 23c9fd0f27644efe93d209c35cd2f52b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073963" comment="wireshark less than 1.4.12-0.5.6"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1595</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1595" source="CVE"/>
	<description>
	The pcap_process_pseudo_header function in wiretap/pcap-common.c in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a WTAP_ENCAP_ERF file containing an Extension or Multi-Channel header with an invalid pseudoheader size, related to the pcap and pcap-ng file parsers.
	</description>
 </metadata>
<!-- 23c9fd0f27644efe93d209c35cd2f52b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073963" comment="wireshark less than 1.4.12-0.5.6"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1596</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1596" source="CVE"/>
	<description>
	The mp2t_process_fragmented_payload function in epan/dissectors/packet-mp2t.c in the MP2T dissector in Wireshark 1.4.x before 1.4.12 and 1.6.x before 1.6.6 allows remote attackers to cause a denial of service (application crash) via a packet containing an invalid pointer value that triggers an incorrect memory-allocation attempt.
	</description>
 </metadata>
<!-- 23c9fd0f27644efe93d209c35cd2f52b -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073963" comment="wireshark less than 1.4.12-0.5.6"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009073964" comment="wireshark-devel less than 1.4.12-0.5.6"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1610</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-1610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1610" source="CVE"/>
	<description>
	Integer overflow in the GetEXIFProperty function in magick/property.c in ImageMagick before 6.7.6-4 allows remote attackers to cause a denial of service (out-of-bounds read) via a large component count for certain EXIF tags in a JPEG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0259.
	</description>
 </metadata>
<!-- 73ca451abc4b60d47f7346db66e99f9a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074682" comment="ImageMagick-Magick++-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074678" comment="ImageMagick-Magick++ less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074679" comment="ImageMagick-devel less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074680" comment="ImageMagick less than 6.2.5-16.34.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074681" comment="perl-PerlMagick less than 6.2.5-16.34.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1667</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1667" source="CVE"/>
	<description>
	ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4328ed71a96bc49951a61a9a05eab4f0 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074662" comment="bind-chrootenv less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074663" comment="bind-devel-64bit less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074664" comment="bind-devel less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074665" comment="bind-doc less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074659" comment="bind-libs-32bit less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074666" comment="bind-libs-64bit less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074667" comment="bind-libs-x86 less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074660" comment="bind-libs less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074661" comment="bind-utils less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074668" comment="bind less than 9.6ESVR7P1-0.10.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074662" comment="bind-chrootenv less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074663" comment="bind-devel-64bit less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074664" comment="bind-devel less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074665" comment="bind-doc less than 9.6ESVR7P1-0.10.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074668" comment="bind less than 9.6ESVR7P1-0.10.1"/>
			</criteria>
		</criteria></criteria>
	<!-- aba1373453815722878a790dee66f659 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104519" comment="bind-chrootenv less than 9.3.4-1.31.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104520" comment="bind-devel less than 9.3.4-1.31.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104521" comment="bind-doc less than 9.3.4-1.31.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104522" comment="bind-libs-32bit less than 9.3.4-1.31.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104523" comment="bind-libs less than 9.3.4-1.31.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104524" comment="bind-utils less than 9.3.4-1.31.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104525" comment="bind less than 9.3.4-1.31.31.1"/>
		</criteria>
	</criteria>
	<!-- fa5792b05ad6f009c42c5cd575b8e906 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104526" comment="bind-chrootenv less than 9.3.4-1.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104527" comment="bind-devel less than 9.3.4-1.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104528" comment="bind-doc less than 9.3.4-1.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104529" comment="bind-libs-32bit less than 9.3.4-1.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104530" comment="bind-libs less than 9.3.4-1.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104531" comment="bind-utils less than 9.3.4-1.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104532" comment="bind less than 9.3.4-1.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1713</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1713" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, 1.4.2_37 and earlier, and JavaFX 2.1 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 458527f9aa3426cff56a9eb352661d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075695" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075757" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075696" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075697" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075699" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075700" comment="java-1_5_0-ibm-devel less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075701" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075702" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075703" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075705" comment="java-1_5_0-ibm less than 1.5.0_sr14.0-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 6c5cd876c149103233c3763ab3c16263 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
		</criteria>
	</criteria>
	<!-- e7a13fdccafdcc81cd4c6d1340a24a02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075668" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075669" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075670" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075671" comment="java-1_4_2-ibm less than 1.4.2_sr13.13-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1716</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1716" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1716" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 458527f9aa3426cff56a9eb352661d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075695" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075757" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075696" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075697" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075699" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075700" comment="java-1_5_0-ibm-devel less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075701" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075702" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075703" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075705" comment="java-1_5_0-ibm less than 1.5.0_sr14.0-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 6c5cd876c149103233c3763ab3c16263 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1717</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1717" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 458527f9aa3426cff56a9eb352661d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075695" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075757" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075696" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075697" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075699" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075700" comment="java-1_5_0-ibm-devel less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075701" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075702" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075703" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075705" comment="java-1_5_0-ibm less than 1.5.0_sr14.0-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 6c5cd876c149103233c3763ab3c16263 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
		</criteria>
	</criteria>
	<!-- e7a13fdccafdcc81cd4c6d1340a24a02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075668" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075669" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075670" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075671" comment="java-1_4_2-ibm less than 1.4.2_sr13.13-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1718</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1718" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1718" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 458527f9aa3426cff56a9eb352661d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075695" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075757" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075696" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075697" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075699" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075700" comment="java-1_5_0-ibm-devel less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075701" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075702" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075703" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075705" comment="java-1_5_0-ibm less than 1.5.0_sr14.0-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 6c5cd876c149103233c3763ab3c16263 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
		</criteria>
	</criteria>
	<!-- e7a13fdccafdcc81cd4c6d1340a24a02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075668" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075669" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075670" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075671" comment="java-1_4_2-ibm less than 1.4.2_sr13.13-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1719</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1719" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1719" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows remote attackers to affect integrity, related to CORBA.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 458527f9aa3426cff56a9eb352661d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075695" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075757" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075696" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075697" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075699" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075700" comment="java-1_5_0-ibm-devel less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075701" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075702" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075703" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075705" comment="java-1_5_0-ibm less than 1.5.0_sr14.0-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 6c5cd876c149103233c3763ab3c16263 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
		</criteria>
	</criteria>
	<!-- e7a13fdccafdcc81cd4c6d1340a24a02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075668" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075669" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075670" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075671" comment="java-1_4_2-ibm less than 1.4.2_sr13.13-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1721</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1721" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1721" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1722.
	</description>
 </metadata>
<!-- 6c5cd876c149103233c3763ab3c16263 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1722</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1722" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, and 6 update 32 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1721.
	</description>
 </metadata>
<!-- 6c5cd876c149103233c3763ab3c16263 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1725</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1725" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1725" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, and 5 update 35 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 458527f9aa3426cff56a9eb352661d4a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075695" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075757" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075696" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075697" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075699" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075700" comment="java-1_5_0-ibm-devel less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075701" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075702" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075703" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr14.0-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075705" comment="java-1_5_0-ibm less than 1.5.0_sr14.0-0.9.1"/>
		</criteria>
	</criteria>
	<!-- 6c5cd876c149103233c3763ab3c16263 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075782" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075783" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr11.0-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075792" comment="java-1_6_0-ibm less than 1.6.0_sr11.0-0.12.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1820</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1820" source="CVE"/>
	<description>
	The bgp_capability_orf function in bgpd in Quagga 0.99.20.1 and earlier allows remote attackers to cause a denial of service (assertion failure and daemon exit) by leveraging a BGP peering relationship and sending a malformed Outbound Route Filtering (ORF) capability TLV in an OPEN message.
	</description>
 </metadata>
<!-- 9bef93966149baad96780e499beb1fec -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074405" comment="quagga-devel less than 0.99.9-14.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074406" comment="quagga less than 0.99.9-14.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1823</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1823" source="CVE"/>
	<description>
	sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 4c521fa4b1380a2123c60bdf8e191643 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074067" comment="apache2-mod_php5 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074068" comment="php5-bcmath less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074069" comment="php5-bz2 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074070" comment="php5-calendar less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074071" comment="php5-ctype less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074072" comment="php5-curl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074073" comment="php5-dba less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074074" comment="php5-dbase less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074075" comment="php5-devel less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074076" comment="php5-dom less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074077" comment="php5-exif less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074078" comment="php5-fastcgi less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074079" comment="php5-ftp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074080" comment="php5-gd less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074081" comment="php5-gettext less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074082" comment="php5-gmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074083" comment="php5-hash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074084" comment="php5-iconv less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074085" comment="php5-imap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074086" comment="php5-json less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074087" comment="php5-ldap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074088" comment="php5-mbstring less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074089" comment="php5-mcrypt less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074090" comment="php5-mhash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074091" comment="php5-mysql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074092" comment="php5-ncurses less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074093" comment="php5-odbc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074094" comment="php5-openssl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074095" comment="php5-pcntl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074096" comment="php5-pdo less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074097" comment="php5-pear less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074098" comment="php5-pgsql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074099" comment="php5-posix less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074100" comment="php5-pspell less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074101" comment="php5-shmop less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074102" comment="php5-snmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074103" comment="php5-soap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074104" comment="php5-sockets less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074105" comment="php5-sqlite less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074106" comment="php5-suhosin less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074107" comment="php5-sysvmsg less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074108" comment="php5-sysvsem less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074109" comment="php5-sysvshm less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074110" comment="php5-tokenizer less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074111" comment="php5-wddx less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074112" comment="php5-xmlreader less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074113" comment="php5-xmlrpc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074114" comment="php5-xsl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074115" comment="php5-zlib less than 5.2.14-0.32.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074067" comment="apache2-mod_php5 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074068" comment="php5-bcmath less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074069" comment="php5-bz2 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074070" comment="php5-calendar less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074071" comment="php5-ctype less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074072" comment="php5-curl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074073" comment="php5-dba less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074074" comment="php5-dbase less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074075" comment="php5-devel less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074076" comment="php5-dom less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074077" comment="php5-exif less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074078" comment="php5-fastcgi less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074079" comment="php5-ftp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074080" comment="php5-gd less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074081" comment="php5-gettext less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074082" comment="php5-gmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074083" comment="php5-hash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074084" comment="php5-iconv less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074085" comment="php5-imap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074087" comment="php5-ldap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074088" comment="php5-mbstring less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074089" comment="php5-mcrypt less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074090" comment="php5-mhash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074091" comment="php5-mysql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074092" comment="php5-ncurses less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074093" comment="php5-odbc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074094" comment="php5-openssl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074095" comment="php5-pcntl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074096" comment="php5-pdo less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074097" comment="php5-pear less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074098" comment="php5-pgsql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074099" comment="php5-posix less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074100" comment="php5-pspell less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074101" comment="php5-shmop less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074102" comment="php5-snmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074103" comment="php5-soap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074104" comment="php5-sockets less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074105" comment="php5-sqlite less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074106" comment="php5-suhosin less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074107" comment="php5-sysvmsg less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074108" comment="php5-sysvsem less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074109" comment="php5-sysvshm less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074116" comment="php5-tidy less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074110" comment="php5-tokenizer less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074111" comment="php5-wddx less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074112" comment="php5-xmlreader less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074113" comment="php5-xmlrpc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074114" comment="php5-xsl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074115" comment="php5-zlib less than 5.2.14-0.32.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1937</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1937" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1937" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1938</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1938" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1938" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1939</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1939" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1939" source="CVE"/>
	<description>
	jsinfer.cpp in Mozilla Firefox ESR 10.x before 10.0.5 and Thunderbird ESR 10.x before 10.0.5 does not properly determine data types, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted JavaScript code.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1940</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1940" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1941</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1941" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1941" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1942</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1942" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1942" source="CVE"/>
	<description>
	The Mozilla Updater and Windows Updater Service in Mozilla Firefox 12.0, Thunderbird 12.0, and SeaMonkey 2.9 on Windows allow local users to gain privileges by loading a DLL file in a privileged context.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121943" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1943</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1943" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1943" source="CVE"/>
	<description>
	Untrusted search path vulnerability in Updater.exe in the Windows Updater Service in Mozilla Firefox 12.0, Thunderbird 12.0, and SeaMonkey 2.9 on Windows allows local users to gain privileges via a Trojan horse wsock32.dll file in an application directory.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1944</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1944" source="CVE"/>
	<description>
	The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1945</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1945" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1945" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1946</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1946" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1946" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1947</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1947" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1947" source="CVE"/>
	<description>
	Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure.
	</description>
 </metadata>
<!-- 17a6ba181710949a9ded0279ec9b1ffb -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074645" comment="MozillaFirefox-translations less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074646" comment="MozillaFirefox less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074647" comment="mozilla-nspr-32bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074654" comment="mozilla-nspr-64bit less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074648" comment="mozilla-nspr-devel less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074655" comment="mozilla-nspr-x86 less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074649" comment="mozilla-nspr less than 4.9.1-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074650" comment="mozilla-nss-32bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074656" comment="mozilla-nss-64bit less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074651" comment="mozilla-nss-devel less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074657" comment="mozilla-nss-x86 less than 3.13.5-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074653" comment="mozilla-nss less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074658" comment="MozillaFirefox-branding-upstream less than 10.0.5-0.8.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074652" comment="mozilla-nss-tools less than 3.13.5-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1948</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1948" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1948" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1949</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1949" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1949" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1950</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1950" source="CVE"/>
	<description>
	The drag-and-drop implementation in Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 allows remote attackers to spoof the address bar by canceling a page load.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1951</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1951" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1951" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsSMILTimeValueSpec::IsEventBased function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code by interacting with objects used for SMIL Timing.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1952</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1952" source="CVE"/>
	<description>
	The nsTableFrame::InsertFrames function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly perform a cast of a frame variable during processing of mixed row-group and column-group frames, which might allow remote attackers to execute arbitrary code via a crafted web site.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1953</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1953" source="CVE"/>
	<description>
	The ElementAnimations::EnsureStyleRuleFor function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (buffer over-read, incorrect pointer dereference, and heap-based buffer overflow) or possibly execute arbitrary code via a crafted web site.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1954</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1954" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsDocument::AdoptNode function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (heap memory corruption) or possibly execute arbitrary code via vectors involving multiple adoptions and empty documents.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1955</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1955" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allow remote attackers to spoof the address bar via vectors involving history.forward and history.back calls.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1956</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1956" source="CVE"/>
	<description>
	Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 do not prevent use of the Object.defineProperty method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1957</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1957" source="CVE"/>
	<description>
	An unspecified parser-utility class in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly handle EMBED elements within description elements in RSS feeds, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a feed.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1958</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1958" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsGlobalWindow::PageHidden function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 might allow remote attackers to execute arbitrary code via vectors related to focused content.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1959</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1959" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not consider the presence of same-compartment security wrappers (SCSW) during the cross-compartment wrapping of objects, which allows remote attackers to bypass intended XBL access restrictions via crafted content.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1960</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1960" source="CVE"/>
	<description>
	The qcms_transform_data_rgb_out_lut_sse2 function in the QCMS implementation in Mozilla Firefox 4.x through 13.0, Thunderbird 5.0 through 13.0, and SeaMonkey before 2.11 might allow remote attackers to obtain sensitive information from process memory via a crafted color profile that triggers an out-of-bounds read operation.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1961</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1961" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly handle duplicate values in X-Frame-Options headers, which makes it easier for remote attackers to conduct clickjacking attacks via a FRAME element referencing a web site that produces these duplicate values.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1962</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1962" source="CVE"/>
	<description>
	Use-after-free vulnerability in the JSDependentString::undepend function in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via vectors involving strings with multiple dependencies.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1963</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1963" source="CVE"/>
	<description>
	The Content Security Policy (CSP) functionality in Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 does not properly restrict the strings placed into the blocked-uri parameter of a violation report, which allows remote web servers to capture OpenID credentials and OAuth 2.0 access tokens by triggering a violation.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1964</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1964" source="CVE"/>
	<description>
	The certificate-warning functionality in browser/components/certerror/content/aboutCertError.xhtml in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.10 does not properly handle attempted clickjacking of the about:certerror page, which allows man-in-the-middle attackers to trick users into adding an unintended exception via an IFRAME element.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1965</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1965" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not properly establish the security context of a feed: URL, which allows remote attackers to bypass unspecified cross-site scripting (XSS) protection mechanisms via a feed:javascript: URL.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1966</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1966" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 13.0 and Firefox ESR 10.x before 10.0.6 do not have the same context-menu restrictions for data: URLs as for javascript: URLs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted URL.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1967</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1967" source="CVE"/>
	<description>
	Mozilla Firefox 4.x through 13.0, Firefox ESR 10.x before 10.0.6, Thunderbird 5.0 through 13.0, Thunderbird ESR 10.x before 10.0.6, and SeaMonkey before 2.11 do not properly implement the JavaScript sandbox utility, which allows remote attackers to execute arbitrary JavaScript code with improper privileges via a javascript: URL.
	</description>
 </metadata>
<!-- 96da6f10cbe978aeccb3ac8d9d6b7ef8 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075001" comment="MozillaFirefox-branding-SLED less than 7-0.8.25"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075002" comment="MozillaFirefox-translations less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075003" comment="MozillaFirefox less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075004" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075005" comment="firefox3-gtk2 less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075009" comment="MozillaFirefox-branding-upstream less than 10.0.6-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075010" comment="firefox3-gtk2-devel less than 2.10.6-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075011" comment="firefox3-gtk2-doc less than 2.10.6-0.12.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1970</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1970" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1971</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1971" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to garbage collection after certain MethodJIT execution, and unknown other vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1972</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1972" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsHTMLEditor::CollapseAdjacentTextNodes function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1973</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1973" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsObjectLoadingContent::LoadObject function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1974</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1974" source="CVE"/>
	<description>
	Use-after-free vulnerability in the gfxTextRun::CanBreakLineBefore function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1975</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1975" source="CVE"/>
	<description>
	Use-after-free vulnerability in the PresShell::CompleteMove function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20121976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-1976</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-1976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1976" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsHTMLSelectElement::SubmitNamesValues function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2088</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2088" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2088" source="CVE"/>
	<description>
	Integer signedness error in the TIFFReadDirectory function in tif_dirread.c in libtiff 3.9.4 and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a negative tile depth in a tiff image, which triggers an improper conversion between signed and unsigned types, leading to a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb00258755d4c0881387cfdfcb958733 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074988" comment="libtiff-32bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074993" comment="libtiff-64bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074994" comment="libtiff-devel-32bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074995" comment="libtiff-devel-64bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074989" comment="libtiff-devel less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074996" comment="libtiff-x86 less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074990" comment="libtiff less than 3.8.2-5.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074994" comment="libtiff-devel-32bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074995" comment="libtiff-devel-64bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074989" comment="libtiff-devel less than 3.8.2-5.28.1"/>
			</criteria>
		</criteria></criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2098</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098" source="CVE"/>
	<description>
	Algorithmic complexity vulnerability in the sorting algorithms in bzip2 compressing stream (BZip2CompressorOutputStream) in Apache Commons Compress before 1.4.1 allows remote attackers to cause a denial of service (CPU consumption) via a file with many repeating inputs.
	</description>
 </metadata>
<!-- af17921d695a9060c06c8e79789774c7 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076170" comment="ant-trax less than 1.6.5-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076171" comment="ant less than 1.6.5-20.9.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076172" comment="ant-apache-oro less than 1.6.5-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076173" comment="ant-apache-regexp less than 1.6.5-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076174" comment="ant-jdepend less than 1.6.5-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076175" comment="ant-junit less than 1.6.5-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076176" comment="ant-nodeps less than 1.6.5-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076170" comment="ant-trax less than 1.6.5-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076171" comment="ant less than 1.6.5-20.9.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2110</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2110" source="CVE"/>
	<description>
	The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in OpenSSL before 0.9.8v, 1.0.0 before 1.0.0i, and 1.0.1 before 1.0.1a does not properly interpret integer data, which allows remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
	<!-- 6f04264f0709c1dee299245669fdda7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075531" comment="compat-openssl097g-32bit less than 0.9.7g-13.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075556" comment="compat-openssl097g-64bit less than 0.9.7g-13.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075557" comment="compat-openssl097g-x86 less than 0.9.7g-13.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075532" comment="compat-openssl097g less than 0.9.7g-13.23.1"/>
		</criteria>
	</criteria>
	<!-- d67d562e97a943fd087f8fa61a2ad294 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074282" comment="openssl-32bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074286" comment="openssl-64bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074283" comment="openssl-devel-32bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074287" comment="openssl-devel-64bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074284" comment="openssl-devel less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074288" comment="openssl-doc less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074289" comment="openssl-x86 less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074285" comment="openssl less than 0.9.8a-18.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074288" comment="openssl-doc less than 0.9.8a-18.68.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2113</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2113" source="CVE"/>
	<description>
	Multiple integer overflows in tiff2pdf in libtiff before 4.0.2 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted tiff image, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb00258755d4c0881387cfdfcb958733 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074988" comment="libtiff-32bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074993" comment="libtiff-64bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074994" comment="libtiff-devel-32bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074995" comment="libtiff-devel-64bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074989" comment="libtiff-devel less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074996" comment="libtiff-x86 less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074990" comment="libtiff less than 3.8.2-5.28.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074994" comment="libtiff-devel-32bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074995" comment="libtiff-devel-64bit less than 3.8.2-5.28.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074989" comment="libtiff-devel less than 3.8.2-5.28.1"/>
			</criteria>
		</criteria></criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2131</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2131" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2131" source="CVE"/>
	<description>
	Multiple integer signedness errors in crypto/buffer/buffer.c in OpenSSL 0.9.8v allow remote attackers to conduct buffer overflow attacks, and cause a denial of service (memory corruption) or possibly have unspecified other impact, via crafted DER data, as demonstrated by an X.509 certificate or an RSA public key.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-2110.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
	<!-- 6f04264f0709c1dee299245669fdda7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075531" comment="compat-openssl097g-32bit less than 0.9.7g-13.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075556" comment="compat-openssl097g-64bit less than 0.9.7g-13.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075557" comment="compat-openssl097g-x86 less than 0.9.7g-13.23.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075532" comment="compat-openssl097g less than 0.9.7g-13.23.1"/>
		</criteria>
	</criteria>
	<!-- d67d562e97a943fd087f8fa61a2ad294 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074282" comment="openssl-32bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074286" comment="openssl-64bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074283" comment="openssl-devel-32bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074287" comment="openssl-devel-64bit less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074284" comment="openssl-devel less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074288" comment="openssl-doc less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074289" comment="openssl-x86 less than 0.9.8a-18.68.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074285" comment="openssl less than 0.9.8a-18.68.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074288" comment="openssl-doc less than 0.9.8a-18.68.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2136</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2136" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2136" source="CVE"/>
	<description>
	The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2141</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2141" source="CVE"/>
	<description>
	Array index error in the handle_nsExtendOutput2Table function in agent/mibgroup/agent/extend.c in Net-SNMP 5.7.1 allows remote authenticated users to cause a denial of service (out-of-bounds read and snmpd crash) via an SNMP GET request for an entry not in the extension table.
	</description>
 </metadata>
<!-- 48b04a33674cd4129a7b5210a9eb8985 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074955" comment="net-snmp-32bit less than 5.3.0.1-25.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074976" comment="net-snmp-64bit less than 5.3.0.1-25.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074977" comment="net-snmp-devel-64bit less than 5.3.0.1-25.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074956" comment="net-snmp-devel less than 5.3.0.1-25.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074978" comment="net-snmp-x86 less than 5.3.0.1-25.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074957" comment="net-snmp less than 5.3.0.1-25.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074958" comment="perl-SNMP less than 5.3.0.1-25.43.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074977" comment="net-snmp-devel-64bit less than 5.3.0.1-25.43.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074956" comment="net-snmp-devel less than 5.3.0.1-25.43.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2214</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2214" source="CVE"/>
	<description>
	proxy.c in libpurple in Pidgin before 2.10.4 does not properly handle canceled SOCKS5 connection attempts, which allows user-assisted remote authenticated users to cause a denial of service (application crash) via a sequence of XMPP file-transfer requests.
	</description>
 </metadata>
<!-- 1444b130f542f9e056af8af62199bd10 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074701" comment="finch-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074698" comment="finch less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074702" comment="libpurple-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074699" comment="libpurple less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074703" comment="pidgin-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074700" comment="pidgin less than 2.6.6-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2311</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2311" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2311" source="CVE"/>
	<description>
	sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 4c521fa4b1380a2123c60bdf8e191643 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074067" comment="apache2-mod_php5 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074068" comment="php5-bcmath less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074069" comment="php5-bz2 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074070" comment="php5-calendar less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074071" comment="php5-ctype less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074072" comment="php5-curl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074073" comment="php5-dba less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074074" comment="php5-dbase less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074075" comment="php5-devel less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074076" comment="php5-dom less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074077" comment="php5-exif less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074078" comment="php5-fastcgi less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074079" comment="php5-ftp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074080" comment="php5-gd less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074081" comment="php5-gettext less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074082" comment="php5-gmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074083" comment="php5-hash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074084" comment="php5-iconv less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074085" comment="php5-imap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074086" comment="php5-json less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074087" comment="php5-ldap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074088" comment="php5-mbstring less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074089" comment="php5-mcrypt less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074090" comment="php5-mhash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074091" comment="php5-mysql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074092" comment="php5-ncurses less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074093" comment="php5-odbc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074094" comment="php5-openssl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074095" comment="php5-pcntl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074096" comment="php5-pdo less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074097" comment="php5-pear less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074098" comment="php5-pgsql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074099" comment="php5-posix less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074100" comment="php5-pspell less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074101" comment="php5-shmop less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074102" comment="php5-snmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074103" comment="php5-soap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074104" comment="php5-sockets less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074105" comment="php5-sqlite less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074106" comment="php5-suhosin less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074107" comment="php5-sysvmsg less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074108" comment="php5-sysvsem less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074109" comment="php5-sysvshm less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074110" comment="php5-tokenizer less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074111" comment="php5-wddx less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074112" comment="php5-xmlreader less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074113" comment="php5-xmlrpc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074114" comment="php5-xsl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074115" comment="php5-zlib less than 5.2.14-0.32.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074067" comment="apache2-mod_php5 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074068" comment="php5-bcmath less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074069" comment="php5-bz2 less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074070" comment="php5-calendar less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074071" comment="php5-ctype less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074072" comment="php5-curl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074073" comment="php5-dba less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074074" comment="php5-dbase less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074075" comment="php5-devel less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074076" comment="php5-dom less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074077" comment="php5-exif less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074078" comment="php5-fastcgi less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074079" comment="php5-ftp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074080" comment="php5-gd less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074081" comment="php5-gettext less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074082" comment="php5-gmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074083" comment="php5-hash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074084" comment="php5-iconv less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074085" comment="php5-imap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074087" comment="php5-ldap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074088" comment="php5-mbstring less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074089" comment="php5-mcrypt less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074090" comment="php5-mhash less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074091" comment="php5-mysql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074092" comment="php5-ncurses less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074093" comment="php5-odbc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074094" comment="php5-openssl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074095" comment="php5-pcntl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074096" comment="php5-pdo less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074097" comment="php5-pear less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074098" comment="php5-pgsql less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074099" comment="php5-posix less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074100" comment="php5-pspell less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074101" comment="php5-shmop less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074102" comment="php5-snmp less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074103" comment="php5-soap less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074104" comment="php5-sockets less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074105" comment="php5-sqlite less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074106" comment="php5-suhosin less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074107" comment="php5-sysvmsg less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074108" comment="php5-sysvsem less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074109" comment="php5-sysvshm less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074116" comment="php5-tidy less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074110" comment="php5-tokenizer less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074111" comment="php5-wddx less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074112" comment="php5-xmlreader less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074113" comment="php5-xmlrpc less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074114" comment="php5-xsl less than 5.2.14-0.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074115" comment="php5-zlib less than 5.2.14-0.32.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2313</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2313" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2313" source="CVE"/>
	<description>
	The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 3395803e5857d3e0f44b39331dc3b010 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107340" comment="kernel-bigsmp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107342" comment="kernel-kdumppae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107343" comment="kernel-vmi less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107344" comment="kernel-vmipae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 74169532cbeb6a34c2168ce4ce202dbf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- 96d47125b6fb737bee4bf3f7619aa63d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9fe1c1f891de7bb8b0abad73549e497a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074617" comment="kernel-iseries64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074618" comment="kernel-ppc64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- d66830daf8e6d37d2c64dfa779e3a77d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2318</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2318" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2318" source="CVE"/>
	<description>
	msg.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.4 does not properly handle crafted characters, which allows remote servers to cause a denial of service (application crash) by placing these characters in a text/plain message.
	</description>
 </metadata>
<!-- 1444b130f542f9e056af8af62199bd10 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074701" comment="finch-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074698" comment="finch less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074702" comment="libpurple-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074699" comment="libpurple less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074703" comment="pidgin-devel less than 2.6.6-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074700" comment="pidgin less than 2.6.6-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2319</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2319" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2319" source="CVE"/>
	<description>
	Multiple buffer overflows in the hfsplus filesystem implementation in the Linux kernel before 3.3.5 allow local users to gain privileges via a crafted HFS plus filesystem, a related issue to CVE-2009-4020.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 3395803e5857d3e0f44b39331dc3b010 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107340" comment="kernel-bigsmp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107342" comment="kernel-kdumppae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107343" comment="kernel-vmi less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107344" comment="kernel-vmipae less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107341" comment="kernel-xenpae less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 74169532cbeb6a34c2168ce4ce202dbf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- 96d47125b6fb737bee4bf3f7619aa63d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074614" comment="kernel-smp less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074610" comment="kernel-debug less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074615" comment="kernel-xen less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 9fe1c1f891de7bb8b0abad73549e497a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074617" comment="kernel-iseries64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074618" comment="kernel-ppc64 less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074616" comment="kernel-kdump less than 2.6.16.60-0.97.1"/>
		</criteria></criteria>
	<!-- d66830daf8e6d37d2c64dfa779e3a77d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074611" comment="kernel-default less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074612" comment="kernel-source less than 2.6.16.60-0.97.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074613" comment="kernel-syms less than 2.6.16.60-0.97.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2333</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2333" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2333" source="CVE"/>
	<description>
	Integer underflow in OpenSSL before 0.9.8x, 1.0.0 before 1.0.0j, and 1.0.1 before 1.0.1c, when TLS 1.1, TLS 1.2, or DTLS is used with CBC encryption, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted TLS packet that is not properly handled during a certain explicit IV calculation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 615504b4f83955616ed79d66c69aaaae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104296" comment="openssl-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104297" comment="openssl-devel-32bit less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104298" comment="openssl-devel less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104299" comment="openssl-doc less than 0.9.8a-18.45.63.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104300" comment="openssl less than 0.9.8a-18.45.63.1"/>
		</criteria>
	</criteria>
	<!-- 72e4e6bb5a3e9c48dd5cb873ce95abda -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074321" comment="openssl-32bit less than 0.9.8a-18.70.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074325" comment="openssl-64bit less than 0.9.8a-18.70.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074322" comment="openssl-devel-32bit less than 0.9.8a-18.70.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074326" comment="openssl-devel-64bit less than 0.9.8a-18.70.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074323" comment="openssl-devel less than 0.9.8a-18.70.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074327" comment="openssl-doc less than 0.9.8a-18.70.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074328" comment="openssl-x86 less than 0.9.8a-18.70.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074324" comment="openssl less than 0.9.8a-18.70.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074327" comment="openssl-doc less than 0.9.8a-18.70.5"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122334" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2334</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2334" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2334" source="CVE"/>
	<description>
	Integer overflow in filter/source/msfilter/msdffimp.cxx in OpenOffice.org (OOo) 3.3, 3.4 Beta, and possibly earlier, and LibreOffice before 3.5.3, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the length of an Escher graphics record in a PowerPoint (.ppt) document, which triggers a buffer overflow.
	</description>
 </metadata>
<!-- 212ca99750b4a43554de347c255f56fb -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009073401" comment="libreoffice-cs less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073403" comment="libreoffice-de less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073406" comment="libreoffice-es less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073408" comment="libreoffice-fr less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073409" comment="libreoffice-galleries less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073410" comment="libreoffice-gnome less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073413" comment="libreoffice-hu less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073414" comment="libreoffice-it less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073415" comment="libreoffice-ja less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073416" comment="libreoffice-kde less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073418" comment="libreoffice-mono less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073422" comment="libreoffice-pl less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073423" comment="libreoffice-pt-BR less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073425" comment="libreoffice-sk less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073428" comment="libreoffice-zh-CN less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073429" comment="libreoffice-zh-TW less than 3.4.5.5-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009073431" comment="libreoffice less than 3.4.5.5-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2335</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2335" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2335" source="CVE"/>
	<description>
	php-wrapper.fcgi does not properly handle command-line arguments, which allows remote attackers to bypass a protection mechanism in PHP 5.3.12 and 5.4.2 and execute arbitrary code by leveraging improper interaction between the PHP sapi/cgi/cgi_main.c component and a query string beginning with a +- sequence.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 9254c34a3137091631d58336e794751f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074452" comment="apache2-mod_php5 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074453" comment="php5-bcmath less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074454" comment="php5-bz2 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074455" comment="php5-calendar less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074456" comment="php5-ctype less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074457" comment="php5-curl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074458" comment="php5-dba less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074459" comment="php5-dbase less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074460" comment="php5-devel less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074461" comment="php5-dom less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074462" comment="php5-exif less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074463" comment="php5-fastcgi less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074464" comment="php5-ftp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074465" comment="php5-gd less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074466" comment="php5-gettext less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074467" comment="php5-gmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074468" comment="php5-hash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074469" comment="php5-iconv less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074470" comment="php5-imap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074471" comment="php5-json less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074472" comment="php5-ldap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074473" comment="php5-mbstring less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074474" comment="php5-mcrypt less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074475" comment="php5-mhash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074476" comment="php5-mysql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074477" comment="php5-ncurses less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074478" comment="php5-odbc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074479" comment="php5-openssl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074480" comment="php5-pcntl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074481" comment="php5-pdo less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074482" comment="php5-pear less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074483" comment="php5-pgsql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074484" comment="php5-posix less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074485" comment="php5-pspell less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074486" comment="php5-shmop less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074487" comment="php5-snmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074488" comment="php5-soap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074489" comment="php5-sockets less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074490" comment="php5-sqlite less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074491" comment="php5-suhosin less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074492" comment="php5-sysvmsg less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074493" comment="php5-sysvsem less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074494" comment="php5-sysvshm less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074495" comment="php5-tokenizer less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074496" comment="php5-wddx less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074497" comment="php5-xmlreader less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074498" comment="php5-xmlrpc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074499" comment="php5-xsl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074500" comment="php5-zlib less than 5.2.14-0.34.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074452" comment="apache2-mod_php5 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074453" comment="php5-bcmath less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074454" comment="php5-bz2 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074455" comment="php5-calendar less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074456" comment="php5-ctype less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074457" comment="php5-curl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074458" comment="php5-dba less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074459" comment="php5-dbase less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074460" comment="php5-devel less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074461" comment="php5-dom less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074462" comment="php5-exif less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074463" comment="php5-fastcgi less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074464" comment="php5-ftp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074465" comment="php5-gd less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074466" comment="php5-gettext less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074467" comment="php5-gmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074468" comment="php5-hash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074469" comment="php5-iconv less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074470" comment="php5-imap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074472" comment="php5-ldap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074473" comment="php5-mbstring less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074474" comment="php5-mcrypt less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074475" comment="php5-mhash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074476" comment="php5-mysql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074477" comment="php5-ncurses less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074478" comment="php5-odbc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074479" comment="php5-openssl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074480" comment="php5-pcntl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074481" comment="php5-pdo less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074482" comment="php5-pear less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074483" comment="php5-pgsql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074484" comment="php5-posix less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074485" comment="php5-pspell less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074486" comment="php5-shmop less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074487" comment="php5-snmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074488" comment="php5-soap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074489" comment="php5-sockets less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074490" comment="php5-sqlite less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074491" comment="php5-suhosin less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074492" comment="php5-sysvmsg less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074493" comment="php5-sysvsem less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074494" comment="php5-sysvshm less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074501" comment="php5-tidy less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074495" comment="php5-tokenizer less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074496" comment="php5-wddx less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074497" comment="php5-xmlreader less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074498" comment="php5-xmlrpc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074499" comment="php5-xsl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074500" comment="php5-zlib less than 5.2.14-0.34.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2336</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2336" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2336" source="CVE"/>
	<description>
	sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 9254c34a3137091631d58336e794751f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074452" comment="apache2-mod_php5 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074453" comment="php5-bcmath less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074454" comment="php5-bz2 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074455" comment="php5-calendar less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074456" comment="php5-ctype less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074457" comment="php5-curl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074458" comment="php5-dba less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074459" comment="php5-dbase less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074460" comment="php5-devel less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074461" comment="php5-dom less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074462" comment="php5-exif less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074463" comment="php5-fastcgi less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074464" comment="php5-ftp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074465" comment="php5-gd less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074466" comment="php5-gettext less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074467" comment="php5-gmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074468" comment="php5-hash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074469" comment="php5-iconv less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074470" comment="php5-imap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074471" comment="php5-json less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074472" comment="php5-ldap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074473" comment="php5-mbstring less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074474" comment="php5-mcrypt less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074475" comment="php5-mhash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074476" comment="php5-mysql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074477" comment="php5-ncurses less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074478" comment="php5-odbc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074479" comment="php5-openssl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074480" comment="php5-pcntl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074481" comment="php5-pdo less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074482" comment="php5-pear less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074483" comment="php5-pgsql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074484" comment="php5-posix less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074485" comment="php5-pspell less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074486" comment="php5-shmop less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074487" comment="php5-snmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074488" comment="php5-soap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074489" comment="php5-sockets less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074490" comment="php5-sqlite less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074491" comment="php5-suhosin less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074492" comment="php5-sysvmsg less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074493" comment="php5-sysvsem less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074494" comment="php5-sysvshm less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074495" comment="php5-tokenizer less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074496" comment="php5-wddx less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074497" comment="php5-xmlreader less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074498" comment="php5-xmlrpc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074499" comment="php5-xsl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074500" comment="php5-zlib less than 5.2.14-0.34.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074452" comment="apache2-mod_php5 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074453" comment="php5-bcmath less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074454" comment="php5-bz2 less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074455" comment="php5-calendar less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074456" comment="php5-ctype less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074457" comment="php5-curl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074458" comment="php5-dba less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074459" comment="php5-dbase less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074460" comment="php5-devel less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074461" comment="php5-dom less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074462" comment="php5-exif less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074463" comment="php5-fastcgi less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074464" comment="php5-ftp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074465" comment="php5-gd less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074466" comment="php5-gettext less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074467" comment="php5-gmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074468" comment="php5-hash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074469" comment="php5-iconv less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074470" comment="php5-imap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074472" comment="php5-ldap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074473" comment="php5-mbstring less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074474" comment="php5-mcrypt less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074475" comment="php5-mhash less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074476" comment="php5-mysql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074477" comment="php5-ncurses less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074478" comment="php5-odbc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074479" comment="php5-openssl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074480" comment="php5-pcntl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074481" comment="php5-pdo less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074482" comment="php5-pear less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074483" comment="php5-pgsql less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074484" comment="php5-posix less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074485" comment="php5-pspell less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074486" comment="php5-shmop less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074487" comment="php5-snmp less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074488" comment="php5-soap less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074489" comment="php5-sockets less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074490" comment="php5-sqlite less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074491" comment="php5-suhosin less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074492" comment="php5-sysvmsg less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074493" comment="php5-sysvsem less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074494" comment="php5-sysvshm less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074501" comment="php5-tidy less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074495" comment="php5-tokenizer less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074496" comment="php5-wddx less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074497" comment="php5-xmlreader less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074498" comment="php5-xmlrpc less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074499" comment="php5-xsl less than 5.2.14-0.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074500" comment="php5-zlib less than 5.2.14-0.34.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2337</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2337" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2337" source="CVE"/>
	<description>
	sudo 1.6.x and 1.7.x before 1.7.9p1, and 1.8.x before 1.8.4p5, does not properly support configurations that use a netmask syntax, which allows local users to bypass intended command restrictions in opportunistic circumstances by executing a command on a host that has an IPv4 address.
	</description>
 </metadata>
<!-- 763144fd2d9bb1af8ff74b0b10f47530 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074313" comment="sudo less than 1.6.9p23-0.14.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122370" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2370</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2370" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2370" source="CVE"/>
	<description>
	Multiple integer overflows in the read_bitmap_file_data function in io-xbm.c in gdk-pixbuf before 2.26.1 allow remote attackers to cause a denial of service (application crash) via a negative (1) height or (2) width in an XBM file, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e4fac303fda249f28a90f89a7455837 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074864" comment="gdk-pixbuf-32bit less than 0.22.0-93.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074880" comment="gdk-pixbuf-64bit less than 0.22.0-93.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074881" comment="gdk-pixbuf-x86 less than 0.22.0-93.9.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074865" comment="gdk-pixbuf less than 0.22.0-93.9.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074882" comment="gdk-pixbuf-devel less than 0.22.0-93.9.1"/>
		</criteria></criteria>
	<!-- d761cd6e1a31389dc3a2d6c8c56cdbd3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074866" comment="gtk2-32bit less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074883" comment="gtk2-64bit less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074884" comment="gtk2-devel-64bit less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074867" comment="gtk2-devel less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074868" comment="gtk2-doc less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074885" comment="gtk2-x86 less than 2.8.11-0.29.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074869" comment="gtk2 less than 2.8.11-0.29.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2372</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2372" source="CVE"/>
	<description>
	The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
	</description>
 </metadata>
<!-- b49853a37fed1bd24d9f0c87f66fc4d7 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107345" comment="ofed-cxgb3-NIC-kmp-bigsmp less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107346" comment="ofed-cxgb3-NIC-kmp-debug less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107347" comment="ofed-cxgb3-NIC-kmp-debug less than 1.5.2_2.6.16.60_0.99.38-0.14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107348" comment="ofed-cxgb3-NIC-kmp-default less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107349" comment="ofed-cxgb3-NIC-kmp-default less than 1.5.2_2.6.16.60_0.99.38-0.14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107350" comment="ofed-cxgb3-NIC-kmp-kdump less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107351" comment="ofed-cxgb3-NIC-kmp-kdump less than 1.5.2_2.6.16.60_0.99.38-0.14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107352" comment="ofed-cxgb3-NIC-kmp-kdumppae less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107353" comment="ofed-cxgb3-NIC-kmp-ppc64 less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107354" comment="ofed-cxgb3-NIC-kmp-smp less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107355" comment="ofed-cxgb3-NIC-kmp-smp less than 1.5.2_2.6.16.60_0.99.38-0.14.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107356" comment="ofed-cxgb3-NIC-kmp-vmi less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107357" comment="ofed-cxgb3-NIC-kmp-vmipae less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107358" comment="ofed-doc less than 1.5.2-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107359" comment="ofed-doc less than 1.5.2-0.14.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107360" comment="ofed-kmp-bigsmp less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107361" comment="ofed-kmp-debug less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107362" comment="ofed-kmp-debug less than 1.5.2_2.6.16.60_0.99.38-0.14.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107363" comment="ofed-kmp-default less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107364" comment="ofed-kmp-default less than 1.5.2_2.6.16.60_0.99.38-0.14.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107365" comment="ofed-kmp-kdump less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107366" comment="ofed-kmp-kdump less than 1.5.2_2.6.16.60_0.99.38-0.14.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107367" comment="ofed-kmp-kdumppae less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107368" comment="ofed-kmp-ppc64 less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107369" comment="ofed-kmp-smp less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107370" comment="ofed-kmp-smp less than 1.5.2_2.6.16.60_0.99.38-0.14.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107371" comment="ofed-kmp-vmi less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107372" comment="ofed-kmp-vmipae less than 1.5.2_2.6.16.60_0.99.36-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107373" comment="ofed less than 1.5.2-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107374" comment="ofed less than 1.5.2-0.14.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107375" comment="ofed-devel less than 1.5.2-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107376" comment="ofed-devel less than 1.5.2-0.14.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2388</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2388" source="CVE"/>
	<description>
	The GMP Plugin in strongSwan 4.2.0 through 4.6.3 allows remote attackers to bypass authentication via a (1) empty or (2) zeroed RSA signature, aka "RSA signature verification vulnerability."
	</description>
 </metadata>
<!-- 6182785f4415eddda64fc010041fd1e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074384" comment="strongswan-doc less than 4.4.0-6.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074385" comment="strongswan less than 4.4.0-6.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2392</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2392" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2392" source="CVE"/>
	<description>
	Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 allows remote attackers to cause a denial of service (infinite loop) via vectors related to the (1) ANSI MAP, (2) ASF, (3) IEEE 802.11, (4) IEEE 802.3, and (5) LTP dissectors.
	</description>
 </metadata>
<!-- 5983708b2e2f0e4b7509a75f22ba2a57 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074788" comment="wireshark-devel less than 1.4.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074787" comment="wireshark less than 1.4.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074788" comment="wireshark-devel less than 1.4.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2393</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2393" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2393" source="CVE"/>
	<description>
	epan/dissectors/packet-diameter.c in the DIAMETER dissector in Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 does not properly construct certain array data structures, which allows remote attackers to cause a denial of service (application crash) via a crafted packet that triggers incorrect memory allocation.
	</description>
 </metadata>
<!-- 5983708b2e2f0e4b7509a75f22ba2a57 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074788" comment="wireshark-devel less than 1.4.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074787" comment="wireshark less than 1.4.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074788" comment="wireshark-devel less than 1.4.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2394</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2394" source="CVE"/>
	<description>
	Wireshark 1.4.x before 1.4.13 and 1.6.x before 1.6.8 on the SPARC and Itanium platforms does not properly perform data alignment for a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a (1) ICMP or (2) ICMPv6 Echo Request packet.
	</description>
 </metadata>
<!-- 5983708b2e2f0e4b7509a75f22ba2a57 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074788" comment="wireshark-devel less than 1.4.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074787" comment="wireshark less than 1.4.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074788" comment="wireshark-devel less than 1.4.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2625</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625" source="CVE"/>
	<description>
	The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
	</description>
 </metadata>
<!-- 7abce5ad0bd27a8e2084fe946c37389f -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107379" comment="xen-doc-html less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107380" comment="xen-doc-pdf less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107381" comment="xen-doc-ps less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107382" comment="xen-kmp-bigsmp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107383" comment="xen-kmp-default less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107393" comment="xen-kmp-kdumppae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107384" comment="xen-kmp-smp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107394" comment="xen-kmp-vmi less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107395" comment="xen-kmp-vmipae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107387" comment="xen-tools-domU less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2655</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2655" source="CVE"/>
	<description>
	PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
	</description>
 </metadata>
<!-- ee84db0d1f4471abd4ab51536636eb1e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075807" comment="postgresql-libs-32bit less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075812" comment="postgresql-libs-64bit less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075813" comment="postgresql-libs-x86 less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075808" comment="postgresql-libs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2663</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2663" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2663" source="CVE"/>
	<description>
	extensions/libxt_tcp.c in iptables through 1.4.21 does not match TCP SYN+FIN packets in --syn rules, which might allow remote attackers to bypass intended firewall restrictions via crafted packets.  NOTE: the CVE-2012-6638 fix makes this issue less relevant.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2665</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-2665" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2665" source="CVE"/>
	<description>
	Multiple heap-based buffer overflows in the XML manifest encryption tag parsing functionality in OpenOffice.org and LibreOffice before 3.5.5 allow remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted Open Document Text (.odt) file with (1) a child tag within an incorrect parent tag, (2) duplicate tags, or (3) a Base64 ChecksumAttribute whose length is not evenly divisible by four.
	</description>
 </metadata>
<!-- 959bec0aafc9124aee7f95faeb6d3285 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075071" comment="libreoffice-cs less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075073" comment="libreoffice-de less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075076" comment="libreoffice-es less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075078" comment="libreoffice-fr less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075079" comment="libreoffice-galleries less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075080" comment="libreoffice-gnome less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075083" comment="libreoffice-hu less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075084" comment="libreoffice-it less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075085" comment="libreoffice-ja less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075086" comment="libreoffice-kde less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075088" comment="libreoffice-mono less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075092" comment="libreoffice-pl less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075093" comment="libreoffice-pt-BR less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075095" comment="libreoffice-sk less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075098" comment="libreoffice-zh-CN less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075099" comment="libreoffice-zh-TW less than 3.5.4.7-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075101" comment="libreoffice less than 3.5.4.7-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2677</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2677" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2677" source="CVE"/>
	<description>
	Integer overflow in the ordered_malloc function in boost/pool/pool.hpp in Boost Pool before 3.9 makes it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large memory chunk size value, which causes less memory to be allocated than expected.
	</description>
 </metadata>
<!-- f7640e04677ae81b96d69003957f49c4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074907" comment="boost-32bit less than 1.33.1-17.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074913" comment="boost-64bit less than 1.33.1-17.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074914" comment="boost-devel-64bit less than 1.33.1-17.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074915" comment="boost-devel less than 1.33.1-17.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074916" comment="boost-doc less than 1.33.1-17.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074908" comment="boost less than 1.33.1-17.15.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009074914" comment="boost-devel-64bit less than 1.33.1-17.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074915" comment="boost-devel less than 1.33.1-17.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009074916" comment="boost-doc less than 1.33.1-17.15.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2687</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2687" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the make_variant_list function in mod_negotiation.c in the mod_negotiation module in the Apache HTTP Server 2.4.x before 2.4.3, when the MultiViews option is enabled, allow remote attackers to inject arbitrary web script or HTML via a crafted filename that is not properly handled during construction of a variant list.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- f43eb058005728c7f0f35af643e86652 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076727" comment="apache2-devel less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076728" comment="apache2-doc less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076729" comment="apache2-example-pages less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076730" comment="apache2-prefork less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076731" comment="apache2-worker less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076732" comment="apache2 less than 2.2.3-16.46.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2688</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2688" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2688" source="CVE"/>
	<description>
	Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an "overflow."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- f1cb3933c34c88daac7ac39335eb91e7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075271" comment="apache2-mod_php5 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075272" comment="php5-bcmath less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075273" comment="php5-bz2 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075274" comment="php5-calendar less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075275" comment="php5-ctype less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075276" comment="php5-curl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075277" comment="php5-dba less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075278" comment="php5-dbase less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075279" comment="php5-devel less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075280" comment="php5-dom less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075281" comment="php5-exif less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075282" comment="php5-fastcgi less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075283" comment="php5-ftp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075284" comment="php5-gd less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075285" comment="php5-gettext less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075286" comment="php5-gmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075287" comment="php5-hash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075288" comment="php5-iconv less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075289" comment="php5-imap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075290" comment="php5-json less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075291" comment="php5-ldap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075292" comment="php5-mbstring less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075293" comment="php5-mcrypt less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075294" comment="php5-mhash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075295" comment="php5-mysql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075296" comment="php5-ncurses less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075297" comment="php5-odbc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075298" comment="php5-openssl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075299" comment="php5-pcntl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075300" comment="php5-pdo less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075301" comment="php5-pear less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075302" comment="php5-pgsql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075303" comment="php5-posix less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075304" comment="php5-pspell less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075305" comment="php5-shmop less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075306" comment="php5-snmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075307" comment="php5-soap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075308" comment="php5-sockets less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075309" comment="php5-sqlite less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075310" comment="php5-suhosin less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075311" comment="php5-sysvmsg less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075312" comment="php5-sysvsem less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075313" comment="php5-sysvshm less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075314" comment="php5-tokenizer less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075315" comment="php5-wddx less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075316" comment="php5-xmlreader less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075317" comment="php5-xmlrpc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075318" comment="php5-xsl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075319" comment="php5-zlib less than 5.2.14-0.36.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075271" comment="apache2-mod_php5 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075272" comment="php5-bcmath less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075273" comment="php5-bz2 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075274" comment="php5-calendar less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075275" comment="php5-ctype less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075276" comment="php5-curl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075277" comment="php5-dba less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075278" comment="php5-dbase less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075279" comment="php5-devel less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075280" comment="php5-dom less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075281" comment="php5-exif less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075282" comment="php5-fastcgi less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075283" comment="php5-ftp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075284" comment="php5-gd less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075285" comment="php5-gettext less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075286" comment="php5-gmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075287" comment="php5-hash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075288" comment="php5-iconv less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075289" comment="php5-imap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075291" comment="php5-ldap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075292" comment="php5-mbstring less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075293" comment="php5-mcrypt less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075294" comment="php5-mhash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075295" comment="php5-mysql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075296" comment="php5-ncurses less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075297" comment="php5-odbc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075298" comment="php5-openssl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075299" comment="php5-pcntl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075300" comment="php5-pdo less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075301" comment="php5-pear less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075302" comment="php5-pgsql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075303" comment="php5-posix less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075304" comment="php5-pspell less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075305" comment="php5-shmop less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075306" comment="php5-snmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075307" comment="php5-soap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075308" comment="php5-sockets less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075309" comment="php5-sqlite less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075310" comment="php5-suhosin less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075311" comment="php5-sysvmsg less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075312" comment="php5-sysvsem less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075313" comment="php5-sysvshm less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075320" comment="php5-tidy less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075314" comment="php5-tokenizer less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075315" comment="php5-wddx less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075316" comment="php5-xmlreader less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075317" comment="php5-xmlrpc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075318" comment="php5-xsl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075319" comment="php5-zlib less than 5.2.14-0.36.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2744</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2744" source="CVE"/>
	<description>
	net/ipv6/netfilter/nf_conntrack_reasm.c in the Linux kernel before 2.6.34, when the nf_conntrack_ipv6 module is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via certain types of fragmented IPv6 packets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2806</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2806" source="CVE"/>
	<description>
	Heap-based buffer overflow in the get_sos function in jdmarker.c in libjpeg-turbo 1.2.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a large component count in the header of a JPEG image.
	</description>
 </metadata>
<!-- 93ef07584e8267eac2fbd3642ae99254 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075201" comment="jpeg less than 6b-752.8.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075202" comment="libjpeg-32bit less than 6.2.0-752.8.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075209" comment="libjpeg-64bit less than 6.2.0-752.8.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075203" comment="libjpeg-devel-32bit less than 6.2.0-18.8.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075210" comment="libjpeg-devel-64bit less than 6.2.0-18.8.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075204" comment="libjpeg-devel less than 6.2.0-18.8.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075211" comment="libjpeg-x86 less than 6.2.0-752.8.45"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075205" comment="libjpeg less than 6.2.0-752.8.45"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2807</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2807" source="CVE"/>
	<description>
	Multiple integer overflows in libxml2, as used in Google Chrome before 20.0.1132.43 and other products, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- e380dcebcb29c98b9351f36692fef4a7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075509" comment="libxml2-32bit less than 2.6.23-15.33.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075513" comment="libxml2-64bit less than 2.6.23-15.33.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075510" comment="libxml2-devel-32bit less than 2.6.23-15.33.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075514" comment="libxml2-devel-64bit less than 2.6.23-15.33.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075511" comment="libxml2-devel less than 2.6.23-15.33.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075515" comment="libxml2-x86 less than 2.6.23-15.33.17"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075512" comment="libxml2 less than 2.6.23-15.33.17"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2812</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2812" source="CVE"/>
	<description>
	The exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
	</description>
 </metadata>
<!-- 9eed174e86533459e960c872be45c510 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075012" comment="libexif-32bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075043" comment="libexif-64bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075044" comment="libexif-x86 less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075013" comment="libexif less than 0.6.13-20.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2814</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2814" source="CVE"/>
	<description>
	Buffer overflow in the exif_entry_format_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted EXIF tags in an image.
	</description>
 </metadata>
<!-- 9eed174e86533459e960c872be45c510 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075012" comment="libexif-32bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075043" comment="libexif-64bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075044" comment="libexif-x86 less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075013" comment="libexif less than 0.6.13-20.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2825</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2825" source="CVE"/>
	<description>
	The XSL implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4e6a2ff81c440983e4a78087fc7ea548 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
	<!-- 8f27549488997eeff15597ab0b7a9c1a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
	<!-- bfb749443a7fe15c20cde485a0b1485b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075014" comment="libxslt-32bit less than 1.1.15-15.18.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075045" comment="libxslt-64bit less than 1.1.15-15.18.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075015" comment="libxslt-devel-32bit less than 1.1.15-15.18.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075046" comment="libxslt-devel-64bit less than 1.1.15-15.18.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075016" comment="libxslt-devel less than 1.1.15-15.18.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075047" comment="libxslt-x86 less than 1.1.15-15.18.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075017" comment="libxslt less than 1.1.15-15.18.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2836</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2836" source="CVE"/>
	<description>
	The exif_data_load_data function in exif-data.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (out-of-bounds read) or possibly obtain sensitive information from process memory via crafted EXIF tags in an image.
	</description>
 </metadata>
<!-- 9eed174e86533459e960c872be45c510 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075012" comment="libexif-32bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075043" comment="libexif-64bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075044" comment="libexif-x86 less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075013" comment="libexif less than 0.6.13-20.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2837</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2837" source="CVE"/>
	<description>
	The mnote_olympus_entry_get_value function in olympus/mnote-olympus-entry.c in the EXIF Tag Parsing Library (aka libexif) before 0.6.21 allows remote attackers to cause a denial of service (divide-by-zero error) via an image with crafted EXIF tags that are not properly handled during the formatting of EXIF maker note tags.
	</description>
 </metadata>
<!-- 9eed174e86533459e960c872be45c510 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075012" comment="libexif-32bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075043" comment="libexif-64bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075044" comment="libexif-x86 less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075013" comment="libexif less than 0.6.13-20.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2841</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2841" source="CVE"/>
	<description>
	Integer underflow in the exif_entry_get_value function in exif-entry.c in the EXIF Tag Parsing Library (aka libexif) 0.6.20 might allow remote attackers to execute arbitrary code via vectors involving a crafted buffer-size parameter during the formatting of an EXIF tag, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 9eed174e86533459e960c872be45c510 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075012" comment="libexif-32bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075043" comment="libexif-64bit less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075044" comment="libexif-x86 less than 0.6.13-20.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075013" comment="libexif less than 0.6.13-20.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2934</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2934" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934" source="CVE"/>
	<description>
	Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not properly protect against a certain AMD processor bug, which allows local guest OS users to cause a denial of service (host hang) via sequential execution of instructions across a non-canonical boundary, a different vulnerability than CVE-2012-0217.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1fd339d2b48672edeccbed4bd3b9dd9d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104450" comment="xen-devel less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104451" comment="xen-doc-html less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104452" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104453" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104454" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104455" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104456" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104457" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104458" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104459" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104460" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104461" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104462" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104463" comment="xen-libs less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104464" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104465" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104466" comment="xen-tools less than 3.2.3_17040_28-0.6.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104467" comment="xen less than 3.2.3_17040_28-0.6.11.1"/>
		</criteria>
	</criteria>
	<!-- bbca71d17e042f39532a8e3060358202 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104468" comment="xen-devel less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104469" comment="xen-doc-html less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104470" comment="xen-doc-pdf less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104471" comment="xen-doc-ps less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104472" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104473" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104474" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104475" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104476" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104477" comment="xen-libs-32bit less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104478" comment="xen-libs less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104479" comment="xen-tools-domU less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104480" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104481" comment="xen-tools less than 3.2.0_16718_26-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104482" comment="xen less than 3.2.0_16718_26-0.8.1"/>
		</criteria>
	</criteria>
	<!-- c25fa3090bc865a8836ebaff073cd9b6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074544" comment="xen-devel less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074545" comment="xen-doc-html less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074546" comment="xen-doc-pdf less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074547" comment="xen-doc-ps less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074548" comment="xen-kmp-bigsmp less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074557" comment="xen-kmp-debug less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074549" comment="xen-kmp-default less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074558" comment="xen-kmp-kdump less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074559" comment="xen-kmp-kdumppae less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074550" comment="xen-kmp-smp less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074560" comment="xen-kmp-vmi less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074561" comment="xen-kmp-vmipae less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074551" comment="xen-libs-32bit less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074552" comment="xen-libs less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074553" comment="xen-tools-domU less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074554" comment="xen-tools-ioemu less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074555" comment="xen-tools less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074556" comment="xen less than 3.2.3_17040_38-0.11.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009074544" comment="xen-devel less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074557" comment="xen-kmp-debug less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074558" comment="xen-kmp-kdump less than 3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074551" comment="xen-libs-32bit less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074552" comment="xen-libs less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074554" comment="xen-tools-ioemu less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074555" comment="xen-tools less than 3.2.3_17040_38-0.11.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009074556" comment="xen less than 3.2.3_17040_38-0.11.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20122944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-2944</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944" source="CVE"/>
	<description>
	Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters.
	</description>
 </metadata>
<!-- 59049173f724dbe51f76a9dd1f317dc8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075516" comment="nut less than 2.0.3-20.10.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3143</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3143" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3143" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-5089.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3159</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3159" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3159" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2012-1533.
	</description>
 </metadata>
<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3174" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java 7 before Update 11 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0422.  NOTE: some parties have mapped CVE-2012-3174 to an issue involving recursive use of the Reflection API, but that issue is already covered as part of CVE-2013-0422.  This identifier is for a different vulnerability whose details are not public as of 20130114.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3213</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3213" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Scripting.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3216</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3216" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- a01a06d8f691fbd19a4c84cccb9cd2f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076070" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076071" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076072" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076073" comment="java-1_4_2-ibm less than 1.4.2_sr13.14-0.5.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3236</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3236" source="CVE"/>
	<description>
	fits-io.c in GIMP before 2.8.1 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a malformed XTENSION header of a .fit file, as demonstrated using a long string.
	</description>
 </metadata>
<!-- 715b3dd4ca6fcd9560aab8f12c861f37 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075146" comment="gimp-devel less than 2.2.10-22.42.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075147" comment="gimp less than 2.2.10-22.42.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3342</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3342" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3365</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3365" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3365" source="CVE"/>
	<description>
	The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- f1cb3933c34c88daac7ac39335eb91e7 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075271" comment="apache2-mod_php5 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075272" comment="php5-bcmath less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075273" comment="php5-bz2 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075274" comment="php5-calendar less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075275" comment="php5-ctype less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075276" comment="php5-curl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075277" comment="php5-dba less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075278" comment="php5-dbase less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075279" comment="php5-devel less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075280" comment="php5-dom less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075281" comment="php5-exif less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075282" comment="php5-fastcgi less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075283" comment="php5-ftp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075284" comment="php5-gd less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075285" comment="php5-gettext less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075286" comment="php5-gmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075287" comment="php5-hash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075288" comment="php5-iconv less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075289" comment="php5-imap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075290" comment="php5-json less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075291" comment="php5-ldap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075292" comment="php5-mbstring less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075293" comment="php5-mcrypt less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075294" comment="php5-mhash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075295" comment="php5-mysql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075296" comment="php5-ncurses less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075297" comment="php5-odbc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075298" comment="php5-openssl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075299" comment="php5-pcntl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075300" comment="php5-pdo less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075301" comment="php5-pear less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075302" comment="php5-pgsql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075303" comment="php5-posix less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075304" comment="php5-pspell less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075305" comment="php5-shmop less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075306" comment="php5-snmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075307" comment="php5-soap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075308" comment="php5-sockets less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075309" comment="php5-sqlite less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075310" comment="php5-suhosin less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075311" comment="php5-sysvmsg less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075312" comment="php5-sysvsem less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075313" comment="php5-sysvshm less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075314" comment="php5-tokenizer less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075315" comment="php5-wddx less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075316" comment="php5-xmlreader less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075317" comment="php5-xmlrpc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075318" comment="php5-xsl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075319" comment="php5-zlib less than 5.2.14-0.36.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075271" comment="apache2-mod_php5 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075272" comment="php5-bcmath less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075273" comment="php5-bz2 less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075274" comment="php5-calendar less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075275" comment="php5-ctype less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075276" comment="php5-curl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075277" comment="php5-dba less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075278" comment="php5-dbase less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075279" comment="php5-devel less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075280" comment="php5-dom less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075281" comment="php5-exif less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075282" comment="php5-fastcgi less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075283" comment="php5-ftp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075284" comment="php5-gd less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075285" comment="php5-gettext less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075286" comment="php5-gmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075287" comment="php5-hash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075288" comment="php5-iconv less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075289" comment="php5-imap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075291" comment="php5-ldap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075292" comment="php5-mbstring less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075293" comment="php5-mcrypt less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075294" comment="php5-mhash less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075295" comment="php5-mysql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075296" comment="php5-ncurses less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075297" comment="php5-odbc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075298" comment="php5-openssl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075299" comment="php5-pcntl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075300" comment="php5-pdo less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075301" comment="php5-pear less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075302" comment="php5-pgsql less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075303" comment="php5-posix less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075304" comment="php5-pspell less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075305" comment="php5-shmop less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075306" comment="php5-snmp less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075307" comment="php5-soap less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075308" comment="php5-sockets less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075309" comment="php5-sqlite less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075310" comment="php5-suhosin less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075311" comment="php5-sysvmsg less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075312" comment="php5-sysvsem less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075313" comment="php5-sysvshm less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075320" comment="php5-tidy less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075314" comment="php5-tokenizer less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075315" comment="php5-wddx less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075316" comment="php5-xmlreader less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075317" comment="php5-xmlrpc less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075318" comment="php5-xsl less than 5.2.14-0.36.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075319" comment="php5-zlib less than 5.2.14-0.36.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3374</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3374" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3374" source="CVE"/>
	<description>
	Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.
	</description>
 </metadata>
<!-- 6cdbffccfb7e818b850e497dc8f94724 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009074979" comment="finch-devel less than 2.6.6-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074959" comment="finch less than 2.6.6-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074980" comment="libpurple-devel less than 2.6.6-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074960" comment="libpurple less than 2.6.6-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074981" comment="pidgin-devel less than 2.6.6-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009074961" comment="pidgin less than 2.6.6-0.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3400</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3400" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3400" source="CVE"/>
	<description>
	Heap-based buffer overflow in the udf_load_logicalvol function in fs/udf/super.c in the Linux kernel before 3.4.5 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via a crafted UDF filesystem.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3401</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3401" source="CVE"/>
	<description>
	The t2p_read_tiff_init function in tiff2pdf (tools/tiff2pdf.c) in LibTIFF 4.0.2 and earlier does not properly initialize the T2P context struct pointer in certain error conditions, which allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image that triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- f8b83ed2a49634464cd29a53ef0fb20a -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075102" comment="libtiff-32bit less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075107" comment="libtiff-64bit less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075108" comment="libtiff-devel-32bit less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075109" comment="libtiff-devel-64bit less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075103" comment="libtiff-devel less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075110" comment="libtiff-x86 less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075104" comment="libtiff less than 3.8.2-5.30.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075108" comment="libtiff-devel-32bit less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075109" comment="libtiff-devel-64bit less than 3.8.2-5.30.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075103" comment="libtiff-devel less than 3.8.2-5.30.5"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3402</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3402" source="CVE"/>
	<description>
	Integer overflow in plug-ins/common/psd.c in the Adobe Photoshop PSD plugin in GIMP 2.2.13 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted channels header value in a PSD image file, which triggers a heap-based buffer overflow, a different vulnerability than CVE-2009-3909.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 12c9a930398cff75c99abf194e212747 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075425" comment="gimp-devel less than 2.2.10-22.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075426" comment="gimp less than 2.2.10-22.46.1"/>
		</criteria>
	</criteria>
	<!-- 5d18ef4dd81fda3effcb7cb85c6ef536 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075266" comment="gimp-devel less than 2.2.10-22.44.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075267" comment="gimp less than 2.2.10-22.44.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3403</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3403" source="CVE"/>
	<description>
	Heap-based buffer overflow in the KiSS CEL file format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted KiSS palette file, which triggers an "invalid free."
	</description>
 </metadata>
<!-- 5d18ef4dd81fda3effcb7cb85c6ef536 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075266" comment="gimp-devel less than 2.2.10-22.44.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075267" comment="gimp less than 2.2.10-22.44.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3406</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3406" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3406" source="CVE"/>
	<description>
	The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE format-string protection mechanism and cause a denial of service (crash) or possibly execute arbitrary code via a crafted format string using positional parameters and a large number of format specifiers, a different vulnerability than CVE-2012-3404 and CVE-2012-3405.
	</description>
 </metadata>
<!-- ae7b2bb12ddda522987dc10489bcbf1f -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076031" comment="glibc-32bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076057" comment="glibc-64bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076032" comment="glibc-devel-32bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076058" comment="glibc-devel-64bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076033" comment="glibc-devel less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076034" comment="glibc-html less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076035" comment="glibc-i18ndata less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076036" comment="glibc-info less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076037" comment="glibc-locale-32bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076059" comment="glibc-locale-64bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076060" comment="glibc-locale-x86 less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076038" comment="glibc-locale less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076061" comment="glibc-profile-32bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076062" comment="glibc-profile-64bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076063" comment="glibc-profile-x86 less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076064" comment="glibc-profile less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076065" comment="glibc-x86 less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076039" comment="glibc less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076040" comment="nscd less than 2.4-31.103.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076066" comment="glibc-dceext-32bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076067" comment="glibc-dceext-64bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076068" comment="glibc-dceext-x86 less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076069" comment="glibc-dceext less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076034" comment="glibc-html less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076061" comment="glibc-profile-32bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076062" comment="glibc-profile-64bit less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076063" comment="glibc-profile-x86 less than 2.4-31.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076064" comment="glibc-profile less than 2.4-31.103.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3410</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3410" source="CVE"/>
	<description>
	Stack-based buffer overflow in lib/sh/eaccess.c in GNU Bash before 4.2 patch 33 might allow local users to bypass intended restricted shell access via a long filename in /dev/fd, which is not properly handled when expanding the /dev/fd prefix.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9f2f628509b07725b6cc9d5d8f9ede1a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075172" comment="bash-x86 less than 3.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075154" comment="bash less than 3.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075155" comment="readline-32bit less than 5.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075173" comment="readline-64bit less than 5.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075156" comment="readline-devel-32bit less than 5.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075174" comment="readline-devel-64bit less than 5.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075157" comment="readline-devel less than 5.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075175" comment="readline-x86 less than 5.1-24.30.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075158" comment="readline less than 5.1-24.30.1"/>
		</criteria>
	</criteria>
	<!-- fd9fa24daf4d325c609035f0c778a723 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104533" comment="bash less than 3.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104534" comment="readline-32bit less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104535" comment="readline-devel-32bit less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104536" comment="readline-devel less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104537" comment="readline less than 5.1-24.32.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3417</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3417" source="CVE"/>
	<description>
	The good_client function in rquotad (rquota_svc.c) in Linux DiskQuota (aka quota) before 3.17 invokes the hosts_ctl function the first time without a host name, which might allow remote attackers to bypass TCP Wrappers rules in hosts.deny.
	</description>
 </metadata>
<!-- 0a46fef03534da311570e6b60db7e6c2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075497" comment="quota less than 3.13-17.18.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3418</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3418" source="CVE"/>
	<description>
	libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds function in p_creds.c; (2) the string byte number value to the __pmDecodeNameList function in p_pmns.c; (3) the numids value to the __pmDecodeIDList function in p_pmns.c; (4) unspecified vectors to the __pmDecodeProfile function in p_profile.c; the (5) status number value or (6) string number value to the __pmDecodeNameList function in p_pmns.c; (7) certain input to the __pmDecodeResult function in p_result.c; (8) the name length field (namelen) to the DecodeNameReq function in p_pmns.c; (9) a crafted PDU_FETCH request to the __pmDecodeFetch function in p_fetch.c; (10) the namelen field in the __pmDecodeInstanceReq function in p_instance.c; (11) the buflen field to the __pmDecodeText function in p_text.c; (12) PDU_INSTANCE packets to the __pmDecodeInstance in p_instance.c; or the (13) c_numpmid or (14) v_numval fields to the __pmDecodeLogControl function in p_lcontrol.c, which triggers integer overflows, heap-based buffer overflows, and/or buffer over-reads.
	</description>
 </metadata>
<!-- 86d59a2714828a99a56a3fdba3660c73 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076353" comment="permissions less than 2013.1.7-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076367" comment="pcp-devel less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3419</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3419" source="CVE"/>
	<description>
	Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.
	</description>
 </metadata>
<!-- 86d59a2714828a99a56a3fdba3660c73 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076353" comment="permissions less than 2013.1.7-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076367" comment="pcp-devel less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3420</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3420" source="CVE"/>
	<description>
	Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src/dofetch.c or (2) a negative type value to the __pmGetPDU function in libpcp/src/pdu.c.
	</description>
 </metadata>
<!-- 86d59a2714828a99a56a3fdba3660c73 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076353" comment="permissions less than 2013.1.7-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076367" comment="pcp-devel less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3421</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3421" source="CVE"/>
	<description>
	The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related to an "event-driven programming flaw."
	</description>
 </metadata>
<!-- 86d59a2714828a99a56a3fdba3660c73 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076353" comment="permissions less than 2013.1.7-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076367" comment="pcp-devel less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3425</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3425" source="CVE"/>
	<description>
	The png_push_read_zTXt function in pngpread.c in libpng 1.0.x before 1.0.58, 1.2.x before 1.2.48, 1.4.x before 1.4.10, and 1.5.x before 1.5.10 allows remote attackers to cause a denial of service (out-of-bounds read) via a large avail_in field value in a PNG image.
	</description>
 </metadata>
<!-- ee829997acb6ea8605d61043117319b5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075189" comment="libpng-32bit less than 1.2.8-19.37.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075196" comment="libpng-64bit less than 1.2.8-19.37.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075190" comment="libpng-devel-32bit less than 1.2.8-19.37.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075197" comment="libpng-devel-64bit less than 1.2.8-19.37.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075191" comment="libpng-devel less than 1.2.8-19.37.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075198" comment="libpng-x86 less than 1.2.8-19.37.24"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075192" comment="libpng less than 1.2.8-19.37.24"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3430</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430" source="CVE"/>
	<description>
	The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.
	</description>
 </metadata>
<!-- e928539d6bca959aca91d810ff33a425 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076279" comment="ofed-cxgb3-NIC-kmp-bigsmp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076280" comment="ofed-cxgb3-NIC-kmp-debug less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076281" comment="ofed-cxgb3-NIC-kmp-default less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076282" comment="ofed-cxgb3-NIC-kmp-kdump less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076283" comment="ofed-cxgb3-NIC-kmp-kdumppae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076284" comment="ofed-cxgb3-NIC-kmp-ppc64 less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076285" comment="ofed-cxgb3-NIC-kmp-smp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076286" comment="ofed-cxgb3-NIC-kmp-vmi less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076287" comment="ofed-cxgb3-NIC-kmp-vmipae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076288" comment="ofed-doc less than 1.5.2-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076289" comment="ofed-kmp-bigsmp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076290" comment="ofed-kmp-debug less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076291" comment="ofed-kmp-default less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076292" comment="ofed-kmp-kdump less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076293" comment="ofed-kmp-kdumppae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076294" comment="ofed-kmp-ppc64 less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076295" comment="ofed-kmp-smp less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076296" comment="ofed-kmp-vmi less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076297" comment="ofed-kmp-vmipae less than 1.5.2_2.6.16.60_0.99.13-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076298" comment="ofed less than 1.5.2-0.12.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076299" comment="ofed-devel less than 1.5.2-0.12.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3438</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3438" source="CVE"/>
	<description>
	The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation.
	</description>
 </metadata>
<!-- 197e00af8ca9eee4ffb65e54b040e40d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077184" comment="ImageMagick-Magick++-devel less than 6.2.5-16.36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077155" comment="ImageMagick-Magick++ less than 6.2.5-16.36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077156" comment="ImageMagick-devel less than 6.2.5-16.36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077157" comment="ImageMagick less than 6.2.5-16.36.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077158" comment="perl-PerlMagick less than 6.2.5-16.36.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3461</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3461" source="CVE"/>
	<description>
	The (1) otrl_base64_otr_decode function in src/b64.c; (2) otrl_proto_data_read_flags and (3) otrl_proto_accept_data functions in src/proto.c; and (4) decode function in toolkit/parse.c in libotr before 3.2.1 allocates a zero-length buffer when decoding a base64 string, which allows remote attackers to cause a denial of service (application crash) via a message with the value "?OTR:===.", which triggers a heap-based buffer overflow.
	</description>
 </metadata>
<!-- fe4d1b88e23655d9450cf3fc8115a6e8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076092" comment="libotr-devel less than 3.0.0-16.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076090" comment="libotr less than 3.0.0-16.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3480</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3480" source="CVE"/>
	<description>
	Multiple integer overflows in the (1) strtod, (2) strtof, (3) strtold, (4) strtod_l, and other unspecified "related functions" in stdlib in GNU C Library (aka glibc or libc6) 2.16 allow local users to cause a denial of service (application crash) and possibly execute arbitrary code via a long string, which triggers a stack-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17c15337eaf4f28f28cdc9f9d3d731ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104319" comment="glibc-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104320" comment="glibc-devel-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104321" comment="glibc-devel less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104322" comment="glibc-html less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104323" comment="glibc-i18ndata less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104324" comment="glibc-info less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104325" comment="glibc-locale-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104326" comment="glibc-locale less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104327" comment="glibc-profile-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104328" comment="glibc-profile less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104329" comment="glibc less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104330" comment="nscd less than 2.4-31.77.102.1"/>
		</criteria>
	</criteria>
	<!-- 2fc8aabbc955d43968edab9c35bd650e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076207" comment="glibc-32bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076225" comment="glibc-64bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076208" comment="glibc-devel-32bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076226" comment="glibc-devel-64bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076209" comment="glibc-devel less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076210" comment="glibc-html less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076211" comment="glibc-i18ndata less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076212" comment="glibc-info less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076213" comment="glibc-locale-32bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076227" comment="glibc-locale-64bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076228" comment="glibc-locale-x86 less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076214" comment="glibc-locale less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076229" comment="glibc-profile-32bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076230" comment="glibc-profile-64bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076231" comment="glibc-profile-x86 less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076232" comment="glibc-profile less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076233" comment="glibc-x86 less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076215" comment="glibc less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076216" comment="nscd less than 2.4-31.107.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076234" comment="glibc-dceext-32bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076235" comment="glibc-dceext-64bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076236" comment="glibc-dceext-x86 less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076237" comment="glibc-dceext less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076210" comment="glibc-html less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076229" comment="glibc-profile-32bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076230" comment="glibc-profile-64bit less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076231" comment="glibc-profile-x86 less than 2.4-31.107.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076232" comment="glibc-profile less than 2.4-31.107.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3481</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3481" source="CVE"/>
	<description>
	Integer overflow in the ReadImage function in plug-ins/common/file-gif-load.c in the GIF image format plug-in in GIMP 2.8.x and earlier allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via crafted height and len properties in a GIF image file, which triggers a heap-based buffer overflow.  NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
<!-- 12c9a930398cff75c99abf194e212747 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075425" comment="gimp-devel less than 2.2.10-22.46.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075426" comment="gimp less than 2.2.10-22.46.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3488</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3488" source="CVE"/>
	<description>
	The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
	</description>
 </metadata>
<!-- ee84db0d1f4471abd4ab51536636eb1e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075807" comment="postgresql-libs-32bit less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075812" comment="postgresql-libs-64bit less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075813" comment="postgresql-libs-x86 less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075808" comment="postgresql-libs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3489</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489" source="CVE"/>
	<description>
	The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
	</description>
 </metadata>
<!-- ee84db0d1f4471abd4ab51536636eb1e -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075807" comment="postgresql-libs-32bit less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075812" comment="postgresql-libs-64bit less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075813" comment="postgresql-libs-x86 less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075808" comment="postgresql-libs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075810" comment="postgresql-contrib less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075806" comment="postgresql-devel less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075811" comment="postgresql-docs less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075814" comment="postgresql-pl less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075815" comment="postgresql-server less than 8.1.23-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075816" comment="postgresql less than 8.1.23-0.11.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3494</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494" source="CVE"/>
	<description>
	The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserved bits of the DR7 debug control register.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6779ef884a44335e87986cb4684ebd15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104538" comment="xen-devel less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104539" comment="xen-doc-html less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104540" comment="xen-doc-pdf less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104541" comment="xen-doc-ps less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104542" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104543" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104544" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104545" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104546" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104547" comment="xen-libs-32bit less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104548" comment="xen-libs less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104549" comment="xen-tools-domU less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104550" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104551" comment="xen-tools less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104552" comment="xen less than 3.2.0_16718_26-0.10.1"/>
		</criteria>
	</criteria>
	<!-- 7abce5ad0bd27a8e2084fe946c37389f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107379" comment="xen-doc-html less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107380" comment="xen-doc-pdf less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107381" comment="xen-doc-ps less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107382" comment="xen-kmp-bigsmp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107383" comment="xen-kmp-default less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107393" comment="xen-kmp-kdumppae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107384" comment="xen-kmp-smp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107394" comment="xen-kmp-vmi less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107395" comment="xen-kmp-vmipae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107387" comment="xen-tools-domU less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
			</criteria>
		</criteria></criteria>
	<!-- b08cee9a947266299a47b5d55046f727 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107408" comment="xen-devel less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107409" comment="xen-doc-html less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107410" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107411" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107412" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107413" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107414" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107415" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107416" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107417" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107418" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107419" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107420" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107421" comment="xen-libs less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107422" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107423" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107424" comment="xen-tools less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107425" comment="xen less than 3.2.3_17040_28-0.6.13.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3495</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495" source="CVE"/>
	<description>
	The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspecified vectors.
	</description>
 </metadata>
<!-- 6779ef884a44335e87986cb4684ebd15 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104538" comment="xen-devel less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104539" comment="xen-doc-html less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104540" comment="xen-doc-pdf less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104541" comment="xen-doc-ps less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104542" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104543" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104544" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104545" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104546" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104547" comment="xen-libs-32bit less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104548" comment="xen-libs less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104549" comment="xen-tools-domU less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104550" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104551" comment="xen-tools less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104552" comment="xen less than 3.2.0_16718_26-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3496</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496" source="CVE"/>
	<description>
	XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.
	</description>
 </metadata>
<!-- 6779ef884a44335e87986cb4684ebd15 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104538" comment="xen-devel less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104539" comment="xen-doc-html less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104540" comment="xen-doc-pdf less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104541" comment="xen-doc-ps less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104542" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104543" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104544" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104545" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104546" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104547" comment="xen-libs-32bit less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104548" comment="xen-libs less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104549" comment="xen-tools-domU less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104550" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104551" comment="xen-tools less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104552" comment="xen less than 3.2.0_16718_26-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3497</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3497" source="CVE"/>
	<description>
	(1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id.
	</description>
 </metadata>
<!-- 1e9042debead5d88c23444a904a4e0c9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3498</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498" source="CVE"/>
	<description>
	PHYSDEVOP_map_pirq in Xen 4.1 and 4.2 and Citrix XenServer 6.0.2 and earlier allows local HVM guest OS kernels to cause a denial of service (host crash) and possibly read hypervisor or guest memory via vectors related to a missing range check of map-&gt;index.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6779ef884a44335e87986cb4684ebd15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104538" comment="xen-devel less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104539" comment="xen-doc-html less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104540" comment="xen-doc-pdf less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104541" comment="xen-doc-ps less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104542" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104543" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104544" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104545" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104546" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104547" comment="xen-libs-32bit less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104548" comment="xen-libs less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104549" comment="xen-tools-domU less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104550" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104551" comment="xen-tools less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104552" comment="xen less than 3.2.0_16718_26-0.10.1"/>
		</criteria>
	</criteria>
	<!-- 7abce5ad0bd27a8e2084fe946c37389f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107379" comment="xen-doc-html less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107380" comment="xen-doc-pdf less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107381" comment="xen-doc-ps less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107382" comment="xen-kmp-bigsmp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107383" comment="xen-kmp-default less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107393" comment="xen-kmp-kdumppae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107384" comment="xen-kmp-smp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107394" comment="xen-kmp-vmi less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107395" comment="xen-kmp-vmipae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107387" comment="xen-tools-domU less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
			</criteria>
		</criteria></criteria>
	<!-- b08cee9a947266299a47b5d55046f727 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107408" comment="xen-devel less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107409" comment="xen-doc-html less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107410" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107411" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107412" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107413" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107414" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107415" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107416" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107417" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107418" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107419" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107420" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107421" comment="xen-libs less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107422" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107423" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107424" comment="xen-tools less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107425" comment="xen less than 3.2.3_17040_28-0.6.13.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3499</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3499" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via vectors involving hostnames and URIs in the (1) mod_imagemap, (2) mod_info, (3) mod_ldap, (4) mod_proxy_ftp, and (5) mod_status modules.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 97088094794178f9a70859d71149c0e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077041" comment="apache2-devel less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077042" comment="apache2-doc less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077043" comment="apache2-example-pages less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077044" comment="apache2-prefork less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077045" comment="apache2-worker less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077046" comment="apache2 less than 2.2.3-16.48.1"/>
		</criteria>
	</criteria>
	<!-- db2ce8dd6eaaf22f8adf423716a58826 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104553" comment="apache2-devel less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104554" comment="apache2-doc less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104555" comment="apache2-example-pages less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104556" comment="apache2-prefork less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104557" comment="apache2-worker less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104558" comment="apache2 less than 2.2.3-16.32.47.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3510</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3510" source="CVE"/>
	<description>
	Use-after-free vulnerability in the xacct_add_tsk function in kernel/tsacct.c in the Linux kernel before 2.6.19 allows local users to obtain potentially sensitive information from kernel memory or cause a denial of service (system crash) via a taskstats TASKSTATS_CMD_ATTR_PID command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 118cf41af33f48911c473f3bd88c74a8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075866" comment="kernel-iseries64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075868" comment="kernel-ppc64 less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 1d5bd8295622191606c935851bd82ff9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 3b3320a96f49fe4615b35ba22bb6cbf3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
		</criteria>
	</criteria>
	<!-- 9dc087603b172b449aa9a07b548bf3cf -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075850" comment="kernel-bigsmp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075870" comment="kernel-kdumppae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075871" comment="kernel-vmi less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075872" comment="kernel-vmipae less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075856" comment="kernel-xenpae less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- c77cfcc87d8e54df006cb42c12c2fadb -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075851" comment="kernel-default less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075852" comment="kernel-smp less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075853" comment="kernel-source less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075854" comment="kernel-syms less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075869" comment="kernel-debug less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075867" comment="kernel-kdump less than 2.6.16.60-0.99.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075855" comment="kernel-xen less than 2.6.16.60-0.99.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3515</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515" source="CVE"/>
	<description>
	Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 30f612a13ba8c3e5184ba89d4582a058 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075873" comment="qemu less than 0.8.2-37.14.1"/>
	</criteria>
	<!-- 6779ef884a44335e87986cb4684ebd15 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104538" comment="xen-devel less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104539" comment="xen-doc-html less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104540" comment="xen-doc-pdf less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104541" comment="xen-doc-ps less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104542" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104543" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104544" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104545" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104546" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104547" comment="xen-libs-32bit less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104548" comment="xen-libs less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104549" comment="xen-tools-domU less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104550" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104551" comment="xen-tools less than 3.2.0_16718_26-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104552" comment="xen less than 3.2.0_16718_26-0.10.1"/>
		</criteria>
	</criteria>
	<!-- 7abce5ad0bd27a8e2084fe946c37389f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107379" comment="xen-doc-html less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107380" comment="xen-doc-pdf less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107381" comment="xen-doc-ps less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107382" comment="xen-kmp-bigsmp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107383" comment="xen-kmp-default less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107393" comment="xen-kmp-kdumppae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107384" comment="xen-kmp-smp less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107394" comment="xen-kmp-vmi less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107395" comment="xen-kmp-vmipae less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107387" comment="xen-tools-domU less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107378" comment="xen-devel less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107391" comment="xen-kmp-debug less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107392" comment="xen-kmp-kdump less than 3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107385" comment="xen-libs-32bit less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107386" comment="xen-libs less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107388" comment="xen-tools-ioemu less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107389" comment="xen-tools less than 3.2.3_17040_40-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107390" comment="xen less than 3.2.3_17040_40-0.7.2"/>
			</criteria>
		</criteria></criteria>
	<!-- b08cee9a947266299a47b5d55046f727 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107408" comment="xen-devel less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107409" comment="xen-doc-html less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107410" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107411" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107412" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107413" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107414" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107415" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107416" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107417" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107418" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107419" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107420" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107421" comment="xen-libs less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107422" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107423" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107424" comment="xen-tools less than 3.2.3_17040_28-0.6.13.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107425" comment="xen less than 3.2.3_17040_28-0.6.13.5"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3516</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3516" source="CVE"/>
	<description>
	The GNTTABOP_swap_grant_ref sub-operation in the grant table hypercall in Xen 4.2 and Citrix XenServer 6.0.2 allows local guest kernels or administrators to cause a denial of service (host crash) and possibly gain privileges via a crafted grant reference that triggers a write to an arbitrary hypervisor memory location.
	</description>
 </metadata>
<!-- 6779ef884a44335e87986cb4684ebd15 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104538" comment="xen-devel less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104539" comment="xen-doc-html less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104540" comment="xen-doc-pdf less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104541" comment="xen-doc-ps less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104542" comment="xen-kmp-bigsmp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104543" comment="xen-kmp-debug less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104544" comment="xen-kmp-default less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104545" comment="xen-kmp-kdump less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104546" comment="xen-kmp-smp less than 3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104547" comment="xen-libs-32bit less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104548" comment="xen-libs less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104549" comment="xen-tools-domU less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104550" comment="xen-tools-ioemu less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104551" comment="xen-tools less than 3.2.0_16718_26-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104552" comment="xen less than 3.2.0_16718_26-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3523</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3523" source="CVE"/>
	<description>
	The STARTTLS implementation in nnrpd in INN before 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a "plaintext command injection" attack, a similar issue to CVE-2011-0411.
	</description>
 </metadata>
<!-- 052e129a0b795031695c195c312556aa -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075558" comment="inn less than 2.4.2-20.9.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3546</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3546" source="CVE"/>
	<description>
	org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.
	</description>
 </metadata>
<!-- cb28ebabe41577ce7048bf358c8a158f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076477" comment="tomcat5-admin-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076478" comment="tomcat5-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076479" comment="tomcat5 less than 5.5.27-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3571</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3571" source="CVE"/>
	<description>
	ISC DHCP 4.1.2 through 4.2.4 and 4.1-ESV before 4.1-ESV-R6 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a malformed client identifier.
	</description>
 </metadata>
<!-- da94d5b3d48594aadd850e6fdb67f6f2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075216" comment="dhcp-client less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075241" comment="dhcp-devel less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075242" comment="dhcp-relay less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075243" comment="dhcp-server less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075217" comment="dhcp less than 3.0.7-7.17.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075241" comment="dhcp-devel less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075242" comment="dhcp-relay less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075243" comment="dhcp-server less than 3.0.7-7.17.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3817</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3817" source="CVE"/>
	<description>
	ISC BIND 9.4.x, 9.5.x, 9.6.x, and 9.7.x before 9.7.6-P2; 9.8.x before 9.8.3-P2; 9.9.x before 9.9.1-P2; and 9.6-ESV before 9.6-ESV-R7-P2, when DNSSEC validation is enabled, does not properly initialize the failing-query cache, which allows remote attackers to cause a denial of service (assertion failure and daemon exit) by sending many queries.
	</description>
 </metadata>
<!-- 336ff0f5a24d826e2d8f3e523f06fe9c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075486" comment="bind-chrootenv less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075487" comment="bind-devel-64bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075488" comment="bind-devel less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075489" comment="bind-doc less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075483" comment="bind-libs-32bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075490" comment="bind-libs-64bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075491" comment="bind-libs-x86 less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075484" comment="bind-libs less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075485" comment="bind-utils less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075492" comment="bind less than 9.6ESVR7P2-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075486" comment="bind-chrootenv less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075487" comment="bind-devel-64bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075488" comment="bind-devel less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075489" comment="bind-doc less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075492" comment="bind less than 9.6ESVR7P2-0.7.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3868</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-3868" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3868" source="CVE"/>
	<description>
	Race condition in the ns_client structure management in ISC BIND 9.9.x before 9.9.1-P2 allows remote attackers to cause a denial of service (memory consumption or process exit) via a large volume of TCP queries.
	</description>
 </metadata>
<!-- 336ff0f5a24d826e2d8f3e523f06fe9c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075486" comment="bind-chrootenv less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075487" comment="bind-devel-64bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075488" comment="bind-devel less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075489" comment="bind-doc less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075483" comment="bind-libs-32bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075490" comment="bind-libs-64bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075491" comment="bind-libs-x86 less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075484" comment="bind-libs less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075485" comment="bind-utils less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075492" comment="bind less than 9.6ESVR7P2-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075486" comment="bind-chrootenv less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075487" comment="bind-devel-64bit less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075488" comment="bind-devel less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075489" comment="bind-doc less than 9.6ESVR7P2-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075492" comment="bind less than 9.6ESVR7P2-0.7.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3954</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3954" source="CVE"/>
	<description>
	Multiple memory leaks in ISC DHCP 4.1.x and 4.2.x before 4.2.4-P1 and 4.1-ESV before 4.1-ESV-R6 allow remote attackers to cause a denial of service (memory consumption) by sending many requests.
	</description>
 </metadata>
<!-- da94d5b3d48594aadd850e6fdb67f6f2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075216" comment="dhcp-client less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075241" comment="dhcp-devel less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075242" comment="dhcp-relay less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075243" comment="dhcp-server less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075217" comment="dhcp less than 3.0.7-7.17.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075241" comment="dhcp-devel less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075242" comment="dhcp-relay less than 3.0.7-7.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075243" comment="dhcp-server less than 3.0.7-7.17.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3956</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3956" source="CVE"/>
	<description>
	Use-after-free vulnerability in the MediaStreamGraphThreadRunnable::Run function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3957</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3957" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsBlockFrame::MarkLineDirty function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3958</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3958" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsHTMLEditRules::DeleteNonTableElements function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3959</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3959" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3959" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsRangeUpdater::SelAdjDeleteNode function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3960</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3960" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozSpellChecker::SetCurrentDictionary function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3961</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3961" source="CVE"/>
	<description>
	Use-after-free vulnerability in the RangeData implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3962</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3962" source="CVE"/>
	<description>
	Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly iterate through the characters in a text run, which allows remote attackers to execute arbitrary code via a crafted document.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3963</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3963" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3963" source="CVE"/>
	<description>
	Use-after-free vulnerability in the js::gc::MapAllocToTraceKind function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3964</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3964" source="CVE"/>
	<description>
	Use-after-free vulnerability in the gfxTextRun::GetUserData function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3965</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3965" source="CVE"/>
	<description>
	Mozilla Firefox before 15.0 does not properly restrict navigation to the about:newtab page, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers creation of a new tab and then a new window.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3966</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3966" source="CVE"/>
	<description>
	Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a negative height value in a BMP image within a .ICO file, related to (1) improper handling of the transparency bitmask by the nsICODecoder component and (2) improper processing of the alpha channel by the nsBMPDecoder component.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3967</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3967" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3967" source="CVE"/>
	<description>
	The WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 on Linux, when a large number of sampler uniforms are used, does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted web site.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3968</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3968" source="CVE"/>
	<description>
	Use-after-free vulnerability in the WebGL implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via vectors related to deletion of a fragment shader by its accessor.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3969</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3969" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3969" source="CVE"/>
	<description>
	Integer overflow in the nsSVGFEMorphologyElement::Filter function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code via a crafted SVG filter that triggers an incorrect sum calculation, leading to a heap-based buffer overflow.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3970</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3970" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3970" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTArray_base::Length function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving movement of a requiredFeatures attribute from one SVG document to another.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3971</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3971" source="CVE"/>
	<description>
	Summer Institute of Linguistics (SIL) Graphite 2, as used in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the (1) Silf::readClassMap and (2) Pass::readPass functions.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3972</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3972" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3972" source="CVE"/>
	<description>
	The format-number functionality in the XSLT implementation in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 allows remote attackers to obtain sensitive information via unspecified vectors that trigger a heap-based buffer over-read.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3973</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3973" source="CVE"/>
	<description>
	The debugger in the developer-tools subsystem in Mozilla Firefox before 15.0, when remote debugging is disabled, does not properly restrict access to the remote-debugging service, which allows remote attackers to execute arbitrary code by leveraging the presence of the HTTPMonitor extension and connecting to that service through the HTTPMonitor port.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3974</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3974" source="CVE"/>
	<description>
	Untrusted search path vulnerability in the installer in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 on Windows allows local users to gain privileges via a Trojan horse executable file in a root directory.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3975</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3975" source="CVE"/>
	<description>
	The DOMParser component in Mozilla Firefox before 15.0, Thunderbird before 15.0, and SeaMonkey before 2.12 loads subresources during parsing of text/html data within an extension, which allows remote attackers to obtain sensitive information by providing crafted data to privileged extension code.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3976</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3976" source="CVE"/>
	<description>
	Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, and SeaMonkey before 2.12 do not properly handle onLocationChange events during navigation between different https sites, which allows remote attackers to spoof the X.509 certificate information in the address bar via a crafted web page.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3977</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3977" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-4930.  Reason: This candidate is a duplicate of CVE-2012-4930.  Notes: All CVE users should reference CVE-2012-4930 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3978</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3978" source="CVE"/>
	<description>
	The nsLocation::CheckURL function in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, Thunderbird ESR 10.x before 10.0.7, and SeaMonkey before 2.12 does not properly follow the security model of the location object, which allows remote attackers to bypass intended content-loading restrictions or possibly have unspecified other impact via vectors involving chrome code.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3979</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3979" source="CVE"/>
	<description>
	Mozilla Firefox before 15.0 on Android does not properly implement unspecified callers of the __android_log_print function, which allows remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3980</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3980" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3980" source="CVE"/>
	<description>
	The web console in Mozilla Firefox before 15.0, Firefox ESR 10.x before 10.0.7, Thunderbird before 15.0, and Thunderbird ESR 10.x before 10.0.7 allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that injects this code and triggers an eval operation.
	</description>
 </metadata>
<!-- 3d961c9ba7250844680b248327a712ac -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075519" comment="MozillaFirefox-branding-SLED less than 7-0.8.31"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075520" comment="MozillaFirefox-translations less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075521" comment="MozillaFirefox less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075522" comment="firefox3-cairo-32bit less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075523" comment="firefox3-cairo less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075524" comment="mozilla-nspr-32bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075549" comment="mozilla-nspr-64bit less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075525" comment="mozilla-nspr-devel less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075550" comment="mozilla-nspr-x86 less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075526" comment="mozilla-nspr less than 4.9.2-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075527" comment="mozilla-nss-32bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075551" comment="mozilla-nss-64bit less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075528" comment="mozilla-nss-devel less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075552" comment="mozilla-nss-x86 less than 3.13.6-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075530" comment="mozilla-nss less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075553" comment="MozillaFirefox-branding-upstream less than 10.0.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075554" comment="firefox3-cairo-devel less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075555" comment="firefox3-cairo-doc less than 1.2.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075529" comment="mozilla-nss-tools less than 3.13.6-0.8.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3982</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3982" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3983</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3983" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3984</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3984" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly handle navigation away from a web page that has a SELECT element's menu active, which allows remote attackers to spoof page content via vectors involving absolute positioning and scrolling.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3985</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3985" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly implement the HTML5 Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks by leveraging initial-origin access after document.domain has been set.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3986</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3986" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3986" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict calls to DOMWindowUtils (aka nsDOMWindowUtils) methods, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3987</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3987" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0 on Android assigns chrome privileges to Reader Mode pages, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3988</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3988" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 might allow user-assisted remote attackers to execute arbitrary code via vectors involving use of mozRequestFullScreen to enter full-screen mode, and use of the history.back method for backwards history navigation.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3989</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3989" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Thunderbird before 16.0, and SeaMonkey before 2.13 do not properly perform a cast of an unspecified variable during use of the instanceof operator on a JavaScript object, which allows remote attackers to execute arbitrary code or cause a denial of service (assertion failure) via a crafted web site.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3990</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3990" source="CVE"/>
	<description>
	Use-after-free vulnerability in the IME State Manager implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors, related to the nsIContent::GetNameSpaceID function.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3991</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3991" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly restrict JSAPI access to the GetProperty function, which allows remote attackers to bypass the Same Origin Policy and possibly have unspecified other impact via a crafted web site.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3992</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3992" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage history data, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive POST content via vectors involving a location.hash write operation and history navigation that triggers the loading of a URL into the history object.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3993</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3993" source="CVE"/>
	<description>
	The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not properly interact with failures of InstallTrigger methods, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site, related to an "XrayWrapper pollution" issue.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3994</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3994" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3994" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allow remote attackers to conduct cross-site scripting (XSS) attacks via a binary plugin that uses Object.defineProperty to shadow the top object, and leverages the relationship between top.location and the location property.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20123995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-3995</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-3995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3995" source="CVE"/>
	<description>
	The IsCSSWordSpacingSpace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4048</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4048" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4048" source="CVE"/>
	<description>
	The PPP dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted packet, as demonstrated by a usbmon dump.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4049</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4049" source="CVE"/>
	<description>
	epan/dissectors/packet-nfs.c in the NFS dissector in Wireshark 1.4.x before 1.4.14, 1.6.x before 1.6.9, and 1.8.x before 1.8.1 allows remote attackers to cause a denial of service (loop and CPU consumption) via a crafted packet.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4179</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4179" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4179" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsHTMLCSSUtils::CreateCSSPropertyTxn function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4180</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4180" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsHTMLEditor::IsPrevCharInNodeWhitespace function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4181</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4181" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsSMILAnimationController::DoSample function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4182</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4182" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTextEditRules::WillInsert function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4183</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4183" source="CVE"/>
	<description>
	Use-after-free vulnerability in the DOMSVGTests::GetRequiredFeatures function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4184</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4184" source="CVE"/>
	<description>
	The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 does not prevent access to properties of a prototype for a standard class, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4185</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4185" source="CVE"/>
	<description>
	Buffer overflow in the nsCharTraits::length function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4186</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4186" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsWaveReader::DecodeAudioData function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4187</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4187" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 do not properly manage a certain insPos variable, which allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and assertion failure) via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4188</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4188" source="CVE"/>
	<description>
	Heap-based buffer overflow in the Convolve3x3 function in Mozilla Firefox before 16.0, Firefox ESR 10.x before 10.0.8, Thunderbird before 16.0, Thunderbird ESR 10.x before 10.0.8, and SeaMonkey before 2.13 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4192</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4192" source="CVE"/>
	<description>
	Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4193</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4193" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0.1, Firefox ESR 10.x before 10.0.9, Thunderbird before 16.0.1, Thunderbird ESR 10.x before 10.0.9, and SeaMonkey before 2.13.1 omit a security check in the defaultValue function during the unwrapping of security wrappers, which allows remote attackers to bypass the Same Origin Policy and read the properties of a Location object, or execute arbitrary JavaScript code, via a crafted web site.
	</description>
 </metadata>
<!-- b54051bb7b93d9b879c04f373ce0061d -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075842" comment="MozillaFirefox-branding-SLED less than 7-0.8.35"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075843" comment="MozillaFirefox-translations less than 10.0.9-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075844" comment="MozillaFirefox less than 10.0.9-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075848" comment="MozillaFirefox-branding-upstream less than 10.0.9-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4194</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4194" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 do not prevent use of the valueOf method to shadow the location object (aka window.location), which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a plugin.
	</description>
 </metadata>
<!-- a779e3f3d65e3943cbd34d5b913f5501 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075887" comment="MozillaFirefox-translations less than 10.0.10-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075888" comment="MozillaFirefox less than 10.0.10-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075889" comment="mozilla-nspr-32bit less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075999" comment="mozilla-nspr-64bit less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075890" comment="mozilla-nspr-devel less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076000" comment="mozilla-nspr-x86 less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075891" comment="mozilla-nspr less than 4.9.3-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076001" comment="MozillaFirefox-branding-upstream less than 10.0.10-0.5.2"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4195</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4195" source="CVE"/>
	<description>
	The nsLocation::CheckURL function in Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 does not properly determine the calling document and principal in its return value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site, and makes it easier for remote attackers to execute arbitrary JavaScript code by leveraging certain add-on behavior.
	</description>
 </metadata>
<!-- a779e3f3d65e3943cbd34d5b913f5501 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075887" comment="MozillaFirefox-translations less than 10.0.10-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075888" comment="MozillaFirefox less than 10.0.10-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075889" comment="mozilla-nspr-32bit less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075999" comment="mozilla-nspr-64bit less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075890" comment="mozilla-nspr-devel less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076000" comment="mozilla-nspr-x86 less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075891" comment="mozilla-nspr less than 4.9.3-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076001" comment="MozillaFirefox-branding-upstream less than 10.0.10-0.5.2"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4196</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4196" source="CVE"/>
	<description>
	Mozilla Firefox before 16.0.2, Firefox ESR 10.x before 10.0.10, Thunderbird before 16.0.2, Thunderbird ESR 10.x before 10.0.10, and SeaMonkey before 2.13.2 allow remote attackers to bypass the Same Origin Policy and read the Location object via a prototype property-injection attack that defeats certain protection mechanisms for this object.
	</description>
 </metadata>
<!-- a779e3f3d65e3943cbd34d5b913f5501 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075887" comment="MozillaFirefox-translations less than 10.0.10-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075888" comment="MozillaFirefox less than 10.0.10-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075889" comment="mozilla-nspr-32bit less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075999" comment="mozilla-nspr-64bit less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075890" comment="mozilla-nspr-devel less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076000" comment="mozilla-nspr-x86 less than 4.9.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075891" comment="mozilla-nspr less than 4.9.3-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076001" comment="MozillaFirefox-branding-upstream less than 10.0.10-0.5.2"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4201</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4201" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4201" source="CVE"/>
	<description>
	The evalInSandbox implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 uses an incorrect context during the handling of JavaScript code that sets the location.href property, which allows remote attackers to conduct cross-site scripting (XSS) attacks or read arbitrary files by leveraging a sandboxed add-on.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4202</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4202" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4202" source="CVE"/>
	<description>
	Heap-based buffer overflow in the image::RasterImage::DrawFrameTo function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via a crafted GIF image.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4203</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4203" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4203" source="CVE"/>
	<description>
	The New Tab page in Mozilla Firefox before 17.0 uses a privileged context for execution of JavaScript code by bookmarklets, which allows user-assisted remote attackers to run arbitrary programs by leveraging a javascript: URL in a bookmark.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4204</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4204" source="CVE"/>
	<description>
	The str_unescape function in the JavaScript engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4205</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4205" source="CVE"/>
	<description>
	Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 assign the system principal, rather than the sandbox principal, to XMLHttpRequest objects created in sandboxes, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks or obtain sensitive information by leveraging a sandboxed add-on.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4206</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4206" source="CVE"/>
	<description>
	Untrusted search path vulnerability in the installer in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 on Windows allows local users to gain privileges via a Trojan horse DLL in the default downloads directory.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4207</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4207" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4207" source="CVE"/>
	<description>
	The HZ-GB-2312 character-set implementation in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly handle a ~ (tilde) character in proximity to a chunk delimiter, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4208</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4208" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4208" source="CVE"/>
	<description>
	The XrayWrapper implementation in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 does not consider the compartment during property filtering, which allows remote attackers to bypass intended chrome-only restrictions on reading DOM object properties via a crafted web site.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4209</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4209" source="CVE"/>
	<description>
	Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 do not prevent use of a "top" frame name-attribute value to access the location property, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving a binary plugin.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4210</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4210" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4210" source="CVE"/>
	<description>
	The Style Inspector in Mozilla Firefox before 17.0 and Firefox ESR 10.x before 10.0.11 does not properly restrict the context of HTML markup and Cascading Style Sheets (CSS) token sequences, which allows user-assisted remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted stylesheet.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4212</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4212" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4212" source="CVE"/>
	<description>
	Use-after-free vulnerability in the XPCWrappedNative::Mark function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4213</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4213" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsEditor::FindNextLeafNode function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4214</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4214" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-5840.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4215</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4215" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4215" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsPlaintextEditor::FireClipboardEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4216</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4216" source="CVE"/>
	<description>
	Use-after-free vulnerability in the gfxFont::GetFontEntry function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4217</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4217" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4217" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsViewManager::ProcessPendingUpdates function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4218</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4218" source="CVE"/>
	<description>
	Use-after-free vulnerability in the BuildTextRunsScanner::BreakSink::SetBreaks function in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4233</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-4233" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4233" source="CVE"/>
	<description>
	LibreOffice 3.5.x before 3.5.7.2 and 3.6.x before 3.6.1, and OpenOffice.org (OOo), allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted (1) odt file to vcllo.dll, (2) ODG (Drawing document) file to svxcorelo.dll, (3) PolyPolygon record in a .wmf (Window Meta File) file embedded in a ppt (PowerPoint) file to tllo.dll, or (4) xls (Excel) file to scfiltlo.dll.
	</description>
 </metadata>
<!-- 75b0fcb15ca3749c7c3e6082b74f167b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009075895" comment="libreoffice-cs less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075897" comment="libreoffice-de less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075900" comment="libreoffice-es less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075902" comment="libreoffice-fr less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075903" comment="libreoffice-galleries less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075904" comment="libreoffice-gnome less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075907" comment="libreoffice-hu less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075908" comment="libreoffice-it less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075909" comment="libreoffice-ja less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075910" comment="libreoffice-kde less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075912" comment="libreoffice-mono less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075916" comment="libreoffice-pl less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075917" comment="libreoffice-pt-BR less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075919" comment="libreoffice-sk less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075922" comment="libreoffice-zh-CN less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075923" comment="libreoffice-zh-TW less than 3.5.4.13-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009075925" comment="libreoffice less than 3.5.4.13-0.7.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4244</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4244" source="CVE"/>
	<description>
	ISC BIND 9.x before 9.7.6-P3, 9.8.x before 9.8.3-P3, 9.9.x before 9.9.1-P3, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P3 allows remote attackers to cause a denial of service (assertion failure and named daemon exit) via a query for a long resource record.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0491290854c3af020f68ff0d5b8b26cd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075874" comment="bind-chrootenv less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075875" comment="bind-devel-64bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075876" comment="bind-devel less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075877" comment="bind-doc less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075857" comment="bind-libs-32bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075878" comment="bind-libs-64bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075879" comment="bind-libs-x86 less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075858" comment="bind-libs less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075859" comment="bind-utils less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075880" comment="bind less than 9.6ESVR7P4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075874" comment="bind-chrootenv less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075875" comment="bind-devel-64bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075876" comment="bind-devel less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075877" comment="bind-doc less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075880" comment="bind less than 9.6ESVR7P4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 32ca5e50f79b64a5f382bb2f2821acc6 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075682" comment="bind-chrootenv less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075683" comment="bind-devel-64bit less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075684" comment="bind-devel less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075685" comment="bind-doc less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075676" comment="bind-libs-32bit less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075686" comment="bind-libs-64bit less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075687" comment="bind-libs-x86 less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075677" comment="bind-libs less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075678" comment="bind-utils less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075688" comment="bind less than 9.6ESVR7P3-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075682" comment="bind-chrootenv less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075683" comment="bind-devel-64bit less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075684" comment="bind-devel less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075685" comment="bind-doc less than 9.6ESVR7P3-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075688" comment="bind less than 9.6ESVR7P3-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e6060a96c82b013f497e12bdab3e50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104559" comment="bind-chrootenv less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104560" comment="bind-devel less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104561" comment="bind-doc less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104562" comment="bind-libs-32bit less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104563" comment="bind-libs less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104564" comment="bind-utils less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104565" comment="bind less than 9.3.4-1.42.1"/>
		</criteria>
	</criteria>
	<!-- 5798d03a4e2045a2e1ed416f1e06f583 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104566" comment="bind-chrootenv less than 9.3.4-1.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104567" comment="bind-devel less than 9.3.4-1.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104568" comment="bind-doc less than 9.3.4-1.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104569" comment="bind-libs-32bit less than 9.3.4-1.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104570" comment="bind-libs less than 9.3.4-1.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104571" comment="bind-utils less than 9.3.4-1.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104572" comment="bind less than 9.3.4-1.40.1"/>
		</criteria>
	</criteria>
	<!-- a8e673632571bbd76e46ad33621a07bc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104573" comment="bind-chrootenv less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104574" comment="bind-devel less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104575" comment="bind-doc less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104576" comment="bind-libs-32bit less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104577" comment="bind-libs less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104578" comment="bind-utils less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104579" comment="bind less than 9.3.4-1.31.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4285</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4285" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4285" source="CVE"/>
	<description>
	The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a zero-length message.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4288</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4288" source="CVE"/>
	<description>
	Integer overflow in the dissect_xtp_ecntl function in epan/dissectors/packet-xtp.c in the XTP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop or application crash) via a large value for a span length.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4289</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4289" source="CVE"/>
	<description>
	epan/dissectors/packet-afp.c in the AFP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a large number of ACL entries.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4290</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4290" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4290" source="CVE"/>
	<description>
	The CTDB dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (loop and CPU consumption) via a malformed packet.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4291</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4291" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4291" source="CVE"/>
	<description>
	The CIP dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (memory consumption) via a malformed packet.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4292</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4292" source="CVE"/>
	<description>
	The dissect_stun_message function in epan/dissectors/packet-stun.c in the STUN dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly interact with key-destruction behavior in a certain tree library, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4293</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4293" source="CVE"/>
	<description>
	plugins/ethercat/packet-ecatmb.c in the EtherCAT Mailbox dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 does not properly handle certain integer fields, which allows remote attackers to cause a denial of service (application exit) via a malformed packet.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4296</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4296" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4296" source="CVE"/>
	<description>
	Buffer overflow in epan/dissectors/packet-rtps2.c in the RTPS2 dissector in Wireshark 1.4.x before 1.4.15, 1.6.x before 1.6.10, and 1.8.x before 1.8.2 allows remote attackers to cause a denial of service (CPU consumption) via a malformed packet.
	</description>
 </metadata>
<!-- 8c97d5c98c64afe228e7a248367ecd19 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075533" comment="wireshark less than 1.4.15-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075559" comment="wireshark-devel less than 1.4.15-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4388</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4388" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4388" source="CVE"/>
	<description>
	The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- fc148b307277a068b432ffd08c765241 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075707" comment="apache2-mod_php5 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075708" comment="php5-bcmath less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075709" comment="php5-bz2 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075710" comment="php5-calendar less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075711" comment="php5-ctype less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075712" comment="php5-curl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075713" comment="php5-dba less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075714" comment="php5-dbase less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075715" comment="php5-devel less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075716" comment="php5-dom less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075717" comment="php5-exif less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075718" comment="php5-fastcgi less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075719" comment="php5-ftp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075720" comment="php5-gd less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075721" comment="php5-gettext less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075722" comment="php5-gmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075723" comment="php5-hash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075724" comment="php5-iconv less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075725" comment="php5-imap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075726" comment="php5-json less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075727" comment="php5-ldap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075728" comment="php5-mbstring less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075729" comment="php5-mcrypt less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075730" comment="php5-mhash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075731" comment="php5-mysql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075732" comment="php5-ncurses less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075733" comment="php5-odbc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075734" comment="php5-openssl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075735" comment="php5-pcntl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075736" comment="php5-pdo less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075737" comment="php5-pear less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075738" comment="php5-pgsql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075739" comment="php5-posix less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075740" comment="php5-pspell less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075741" comment="php5-shmop less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075742" comment="php5-snmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075743" comment="php5-soap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075744" comment="php5-sockets less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075745" comment="php5-sqlite less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075746" comment="php5-suhosin less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075747" comment="php5-sysvmsg less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075748" comment="php5-sysvsem less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075749" comment="php5-sysvshm less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075750" comment="php5-tokenizer less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075751" comment="php5-wddx less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075752" comment="php5-xmlreader less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075753" comment="php5-xmlrpc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075754" comment="php5-xsl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075755" comment="php5-zlib less than 5.2.14-0.40.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075707" comment="apache2-mod_php5 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075708" comment="php5-bcmath less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075709" comment="php5-bz2 less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075710" comment="php5-calendar less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075711" comment="php5-ctype less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075712" comment="php5-curl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075713" comment="php5-dba less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075714" comment="php5-dbase less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075715" comment="php5-devel less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075716" comment="php5-dom less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075717" comment="php5-exif less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075718" comment="php5-fastcgi less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075719" comment="php5-ftp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075720" comment="php5-gd less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075721" comment="php5-gettext less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075722" comment="php5-gmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075723" comment="php5-hash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075724" comment="php5-iconv less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075725" comment="php5-imap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075727" comment="php5-ldap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075728" comment="php5-mbstring less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075729" comment="php5-mcrypt less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075730" comment="php5-mhash less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075731" comment="php5-mysql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075732" comment="php5-ncurses less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075733" comment="php5-odbc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075734" comment="php5-openssl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075735" comment="php5-pcntl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075736" comment="php5-pdo less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075737" comment="php5-pear less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075738" comment="php5-pgsql less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075739" comment="php5-posix less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075740" comment="php5-pspell less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075741" comment="php5-shmop less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075742" comment="php5-snmp less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075743" comment="php5-soap less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075744" comment="php5-sockets less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075745" comment="php5-sqlite less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075746" comment="php5-suhosin less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075747" comment="php5-sysvmsg less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075748" comment="php5-sysvsem less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075749" comment="php5-sysvshm less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075756" comment="php5-tidy less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075750" comment="php5-tokenizer less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075751" comment="php5-wddx less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075752" comment="php5-xmlreader less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075753" comment="php5-xmlrpc less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075754" comment="php5-xsl less than 5.2.14-0.40.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075755" comment="php5-zlib less than 5.2.14-0.40.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4405</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4405" source="CVE"/>
	<description>
	Multiple integer underflows in the icmLut_allocate function in International Color Consortium (ICC) Format library (icclib), as used in Ghostscript 9.06 and Argyll Color Management System, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted (1) PostScript or (2) PDF file with embedded images, which triggers a heap-based buffer overflow.  NOTE: this issue is also described as an array index error.
	</description>
 </metadata>
<!-- 16655a319f6c06a08b5e85f00894fcfd -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075759" comment="ghostscript-fonts-other less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075771" comment="ghostscript-fonts-rus less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075760" comment="ghostscript-fonts-std less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075761" comment="ghostscript-library less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075772" comment="ghostscript-omni less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075762" comment="ghostscript-x11 less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075773" comment="libgimpprint-devel less than 4.2.7-62.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075763" comment="libgimpprint less than 4.2.7-62.28.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009075771" comment="ghostscript-fonts-rus less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075772" comment="ghostscript-omni less than 8.15.4-16.28.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009075773" comment="libgimpprint-devel less than 4.2.7-62.28.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4411</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411" source="CVE"/>
	<description>
	The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor.  NOTE: this might be a duplicate of CVE-2007-0998.
	</description>
 </metadata>
<!-- 1e9042debead5d88c23444a904a4e0c9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4412</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4412" source="CVE"/>
	<description>
	Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 190862be14e3ed91b361e0b0a66e292a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
		</criteria>
	</criteria>
	<!-- 767429925ce018c15cbe14c33d6a0f11 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104592" comment="glibc-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104593" comment="glibc-devel-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104594" comment="glibc-devel less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104595" comment="glibc-html less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104596" comment="glibc-i18ndata less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104597" comment="glibc-info less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104598" comment="glibc-locale-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104599" comment="glibc-locale less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104600" comment="glibc-profile-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104601" comment="glibc-profile less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104602" comment="glibc less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104603" comment="nscd less than 2.4-31.111.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4444</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4444" source="CVE"/>
	<description>
	The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 42590e04eddb51fa31379710deb16611 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077357" comment="kernel-smp less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4f3691ec5a62d5e0a58b289de36e7ba5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
		</criteria>
	</criteria>
	<!-- 60a0921c1bb3961c00333f60f45fee0b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077361" comment="kernel-bigsmp less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077365" comment="kernel-kdumppae less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077357" comment="kernel-smp less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077366" comment="kernel-vmi less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077367" comment="kernel-vmipae less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077362" comment="kernel-xenpae less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077362" comment="kernel-xenpae less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 806641e6eb093ae891357f0c47c7e76f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077368" comment="kernel-iseries64 less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077369" comment="kernel-ppc64 less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- b108e81194a14724506e0d40a5303d13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4447</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4447" source="CVE"/>
	<description>
	Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- e82a9ac77700ce38cd74ae7a74f81150 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076448" comment="libtiff-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076462" comment="libtiff-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076463" comment="libtiff-devel-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076464" comment="libtiff-devel-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076449" comment="libtiff-devel less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076465" comment="libtiff-x86 less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076450" comment="libtiff less than 3.8.2-5.32.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076463" comment="libtiff-devel-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076464" comment="libtiff-devel-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076449" comment="libtiff-devel less than 3.8.2-5.32.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4466</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-4466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4466" source="CVE"/>
	<description>
	Ruby 1.8.7 before patchlevel 371, 1.9.3 before patchlevel 286, and 2.0 before revision r37068 allows context-dependent attackers to bypass safe-level restrictions and modify untainted strings via the name_err_mesg_to_str API function, which marks the string as tainted, a different vulnerability than CVE-2011-1005.
	</description>
 </metadata>
<!-- 4c9e95f258c3139c5c70de419c8f734b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076979" comment="ruby-devel less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076980" comment="ruby-doc-html less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076981" comment="ruby-doc-ri less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076982" comment="ruby-examples less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076983" comment="ruby-test-suite less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076984" comment="ruby-tk less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076967" comment="ruby less than 1.8.6.p369-0.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4522</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-4522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4522" source="CVE"/>
	<description>
	The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
	</description>
 </metadata>
<!-- 4c9e95f258c3139c5c70de419c8f734b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076979" comment="ruby-devel less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076980" comment="ruby-doc-html less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076981" comment="ruby-doc-ri less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076982" comment="ruby-examples less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076983" comment="ruby-test-suite less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076984" comment="ruby-tk less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076967" comment="ruby less than 1.8.6.p369-0.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4530</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4530" source="CVE"/>
	<description>
	The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b51bf3e02179f8f70c7b2ada2571a2d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077027" comment="kernel-bigsmp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077049" comment="kernel-kdumppae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077050" comment="kernel-vmi less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077051" comment="kernel-vmipae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 7cf4de409b28c5f187bc1e9f71ccd64f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ac5626f6e7f483c6dac1cc5fe253fcf9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ba0e542087a9075aed8c17a29d5f1cb8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
		</criteria>
	</criteria>
	<!-- dba6fc0fdae22199ec260695a6d2179e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077052" comment="kernel-iseries64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077053" comment="kernel-ppc64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4535</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4535" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535" source="CVE"/>
	<description>
	Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e9042debead5d88c23444a904a4e0c9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4536</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536" source="CVE"/>
	<description>
	The (1) domain_pirq_to_emuirq and (2) physdev_unmap_pirq functions in Xen 2.2 allows local guest OS administrators to cause a denial of service (Xen crash) via a crafted pirq value that triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 1e9042debead5d88c23444a904a4e0c9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4537</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537" source="CVE"/>
	<description>
	Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e9042debead5d88c23444a904a4e0c9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4538</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538" source="CVE"/>
	<description>
	The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors.
	</description>
 </metadata>
<!-- 1e9042debead5d88c23444a904a4e0c9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4539</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539" source="CVE"/>
	<description>
	Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability."
	</description>
 </metadata>
<!-- 1e9042debead5d88c23444a904a4e0c9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4544</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544" source="CVE"/>
	<description>
	The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e9042debead5d88c23444a904a4e0c9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107428" comment="xen-doc-html less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107429" comment="xen-doc-html less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107430" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107431" comment="xen-doc-pdf less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107432" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107433" comment="xen-doc-ps less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107434" comment="xen-kmp-bigsmp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107435" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107436" comment="xen-kmp-default less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107454" comment="xen-kmp-kdumppae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107437" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107438" comment="xen-kmp-smp less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107455" comment="xen-kmp-vmi less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107456" comment="xen-kmp-vmipae less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107442" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107443" comment="xen-tools-domU less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009107426" comment="xen-devel less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107427" comment="xen-devel less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107450" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107451" comment="xen-kmp-debug less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107452" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107453" comment="xen-kmp-kdump less than 3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107439" comment="xen-libs-32bit less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107440" comment="xen-libs less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107441" comment="xen-libs less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107444" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107445" comment="xen-tools-ioemu less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107446" comment="xen-tools less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107447" comment="xen-tools less than 3.2.3_17040_42-0.7.2"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107448" comment="xen less than 3.2.3_17040_42-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009107449" comment="xen less than 3.2.3_17040_42-0.7.2"/>
			</criteria>
		</criteria></criteria>
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4557</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4557" source="CVE"/>
	<description>
	The mod_proxy_ajp module in the Apache HTTP Server 2.2.12 through 2.2.21 places a worker node into an error state upon detection of a long request-processing time, which allows remote attackers to cause a denial of service (worker consumption) via an expensive request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25e42b7bd84d54954a51c9fe38e777e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104301" comment="apache2-devel less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104302" comment="apache2-doc less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104303" comment="apache2-example-pages less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104304" comment="apache2-prefork less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104305" comment="apache2-worker less than 2.2.3-16.32.45.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104306" comment="apache2 less than 2.2.3-16.32.45.1"/>
		</criteria>
	</criteria>
	<!-- f43eb058005728c7f0f35af643e86652 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076727" comment="apache2-devel less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076728" comment="apache2-doc less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076729" comment="apache2-example-pages less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076730" comment="apache2-prefork less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076731" comment="apache2-worker less than 2.2.3-16.46.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076732" comment="apache2 less than 2.2.3-16.46.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4558</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4558" source="CVE"/>
	<description>
	Multiple cross-site scripting (XSS) vulnerabilities in the balancer_handler function in the manager interface in mod_proxy_balancer.c in the mod_proxy_balancer module in the Apache HTTP Server 2.2.x before 2.2.24-dev and 2.4.x before 2.4.4 allow remote attackers to inject arbitrary web script or HTML via a crafted string.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 97088094794178f9a70859d71149c0e0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077041" comment="apache2-devel less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077042" comment="apache2-doc less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077043" comment="apache2-example-pages less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077044" comment="apache2-prefork less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077045" comment="apache2-worker less than 2.2.3-16.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077046" comment="apache2 less than 2.2.3-16.48.1"/>
		</criteria>
	</criteria>
	<!-- db2ce8dd6eaaf22f8adf423716a58826 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104553" comment="apache2-devel less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104554" comment="apache2-doc less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104555" comment="apache2-example-pages less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104556" comment="apache2-prefork less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104557" comment="apache2-worker less than 2.2.3-16.32.47.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104558" comment="apache2 less than 2.2.3-16.32.47.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4564</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4564" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4564" source="CVE"/>
	<description>
	ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- e82a9ac77700ce38cd74ae7a74f81150 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076448" comment="libtiff-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076462" comment="libtiff-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076463" comment="libtiff-devel-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076464" comment="libtiff-devel-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076449" comment="libtiff-devel less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076465" comment="libtiff-x86 less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076450" comment="libtiff less than 3.8.2-5.32.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076463" comment="libtiff-devel-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076464" comment="libtiff-devel-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076449" comment="libtiff-devel less than 3.8.2-5.32.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20124929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-4929</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-4929" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4929" source="CVE"/>
	<description>
	The TLS protocol 1.2 and earlier, as used in Mozilla Firefox, Google Chrome, Qt, and other products, can encrypt compressed data without properly obfuscating the length of the unencrypted data, which allows man-in-the-middle attackers to obtain plaintext HTTP headers by observing length differences during a series of guesses in which a string in an HTTP request potentially matches an unknown string in an HTTP header, aka a "CRIME" attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 42741ff95d9d4f1604b9b2d2fc5ec078 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076919" comment="openssl-32bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076929" comment="openssl-64bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076920" comment="openssl-devel-32bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076930" comment="openssl-devel-64bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076921" comment="openssl-devel less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076931" comment="openssl-doc less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076932" comment="openssl-x86 less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076922" comment="openssl less than 0.9.8a-18.76.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076931" comment="openssl-doc less than 0.9.8a-18.76.1"/>
		</criteria></criteria>
	<!-- c554034a3af450bcfad676917143134b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104640" comment="openssl-32bit less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104641" comment="openssl-devel-32bit less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104642" comment="openssl-devel less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104643" comment="openssl-doc less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104644" comment="openssl less than 0.9.8a-18.45.69.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5068</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5068" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5068" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5069</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5069" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5069" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Concurrency.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5071</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5071" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5071" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality and integrity, related to JMX.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125072" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5072</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5072" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5072" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, and 6 Update 35 and earlier, allows remote attackers to affect confidentiality via unknown vectors related to Security.
	</description>
 </metadata>
<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5073</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5073" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5079.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- a01a06d8f691fbd19a4c84cccb9cd2f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076070" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076071" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076072" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076073" comment="java-1_4_2-ibm less than 1.4.2_sr13.14-0.5.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5075</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5075" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, related to JMX.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5079</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5079" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries, a different vulnerability than CVE-2012-5073.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- a01a06d8f691fbd19a4c84cccb9cd2f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076070" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076071" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076072" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076073" comment="java-1_4_2-ibm less than 1.4.2_sr13.14-0.5.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5081</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5081" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect availability, related to JSSE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- a01a06d8f691fbd19a4c84cccb9cd2f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076070" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076071" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076072" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076073" comment="java-1_4_2-ibm less than 1.4.2_sr13.14-0.5.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5083</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5083" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, 1.4.2_38 and earlier, and JavaFX 2.2 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- a01a06d8f691fbd19a4c84cccb9cd2f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076070" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076071" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076072" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076073" comment="java-1_4_2-ibm less than 1.4.2_sr13.14-0.5.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5084</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5084" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5084" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, 5.0 Update 36 and earlier, and 1.4.2_38 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- a01a06d8f691fbd19a4c84cccb9cd2f1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076070" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076071" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076072" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076073" comment="java-1_4_2-ibm less than 1.4.2_sr13.14-0.5.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5089</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5089" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5089" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier, 6 Update 35 and earlier, and 5.0 Update 36 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JMX, a different vulnerability than CVE-2012-3143.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 94ebbbaeb864d11273a4fe129dc23269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076107" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076108" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076109" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076110" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076111" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076112" comment="java-1_6_0-ibm-devel less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076113" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076114" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076115" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076116" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr12.0-0.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076117" comment="java-1_6_0-ibm less than 1.6.0_sr12.0-0.10.1"/>
		</criteria>
	</criteria>
	<!-- bb56b08850390b907db4d458f187e204 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076041" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076074" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076042" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076043" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076045" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076046" comment="java-1_5_0-ibm-devel less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076047" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076048" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076049" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr15.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076051" comment="java-1_5_0-ibm less than 1.5.0_sr15.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5134</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5134" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5134" source="CVE"/>
	<description>
	Heap-based buffer underflow in the xmlParseAttValueComplex function in parser.c in libxml2 2.9.0 and earlier, as used in Google Chrome before 23.0.1271.91 and other products, allows remote attackers to cause a denial of service or possibly execute arbitrary code via crafted entities in an XML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 109525a062f4923fd62bd1c1a3772bd8 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076162" comment="libxml2-32bit less than 2.6.23-15.35.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076177" comment="libxml2-64bit less than 2.6.23-15.35.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076163" comment="libxml2-devel-32bit less than 2.6.23-15.35.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076178" comment="libxml2-devel-64bit less than 2.6.23-15.35.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076164" comment="libxml2-devel less than 2.6.23-15.35.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076165" comment="libxml2-python less than 2.6.23-15.35.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076179" comment="libxml2-x86 less than 2.6.23-15.35.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076166" comment="libxml2 less than 2.6.23-15.35.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076180" comment="libxml2-test less than 2.6.23-15.35.1"/>
		</criteria></criteria>
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5166</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP2 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5166" source="CVE"/>
	<description>
	ISC BIND 9.x before 9.7.6-P4, 9.8.x before 9.8.3-P4, 9.9.x before 9.9.1-P4, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P4 allows remote attackers to cause a denial of service (named daemon hang) via unspecified combinations of resource records.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0491290854c3af020f68ff0d5b8b26cd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075874" comment="bind-chrootenv less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075875" comment="bind-devel-64bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075876" comment="bind-devel less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075877" comment="bind-doc less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075857" comment="bind-libs-32bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075878" comment="bind-libs-64bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075879" comment="bind-libs-x86 less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075858" comment="bind-libs less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075859" comment="bind-utils less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075880" comment="bind less than 9.6ESVR7P4-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009075874" comment="bind-chrootenv less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075875" comment="bind-devel-64bit less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075876" comment="bind-devel less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075877" comment="bind-doc less than 9.6ESVR7P4-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009075880" comment="bind less than 9.6ESVR7P4-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 43e6060a96c82b013f497e12bdab3e50 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104559" comment="bind-chrootenv less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104560" comment="bind-devel less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104561" comment="bind-doc less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104562" comment="bind-libs-32bit less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104563" comment="bind-libs less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104564" comment="bind-utils less than 9.3.4-1.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104565" comment="bind less than 9.3.4-1.42.1"/>
		</criteria>
	</criteria>
	<!-- a8e673632571bbd76e46ad33621a07bc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp2-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104573" comment="bind-chrootenv less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104574" comment="bind-devel less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104575" comment="bind-doc less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104576" comment="bind-libs-32bit less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104577" comment="bind-libs less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104578" comment="bind-utils less than 9.3.4-1.31.33.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104579" comment="bind less than 9.3.4-1.31.33.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5513</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513" source="CVE"/>
	<description>
	The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 193b206adfdaf6da1ce1c5ced79e9f29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076124" comment="xen-devel less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076125" comment="xen-doc-html less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076126" comment="xen-doc-pdf less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076127" comment="xen-doc-ps less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076128" comment="xen-kmp-bigsmp less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076139" comment="xen-kmp-debug less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076129" comment="xen-kmp-default less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076140" comment="xen-kmp-kdump less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076141" comment="xen-kmp-kdumppae less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076130" comment="xen-kmp-smp less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076142" comment="xen-kmp-vmi less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076143" comment="xen-kmp-vmipae less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076131" comment="xen-libs-32bit less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076132" comment="xen-libs less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076133" comment="xen-tools-domU less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076134" comment="xen-tools-ioemu less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076135" comment="xen-tools less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076136" comment="xen less than 3.2.3_17040_44-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076124" comment="xen-devel less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076139" comment="xen-kmp-debug less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076140" comment="xen-kmp-kdump less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076131" comment="xen-libs-32bit less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076132" comment="xen-libs less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076134" comment="xen-tools-ioemu less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076135" comment="xen-tools less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076136" comment="xen less than 3.2.3_17040_44-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5515</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515" source="CVE"/>
	<description>
	The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 193b206adfdaf6da1ce1c5ced79e9f29 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076124" comment="xen-devel less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076125" comment="xen-doc-html less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076126" comment="xen-doc-pdf less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076127" comment="xen-doc-ps less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076128" comment="xen-kmp-bigsmp less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076139" comment="xen-kmp-debug less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076129" comment="xen-kmp-default less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076140" comment="xen-kmp-kdump less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076141" comment="xen-kmp-kdumppae less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076130" comment="xen-kmp-smp less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076142" comment="xen-kmp-vmi less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076143" comment="xen-kmp-vmipae less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076131" comment="xen-libs-32bit less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076132" comment="xen-libs less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076133" comment="xen-tools-domU less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076134" comment="xen-tools-ioemu less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076135" comment="xen-tools less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076136" comment="xen less than 3.2.3_17040_44-0.7.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076124" comment="xen-devel less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076139" comment="xen-kmp-debug less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076140" comment="xen-kmp-kdump less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076131" comment="xen-libs-32bit less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076132" comment="xen-libs less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076134" comment="xen-tools-ioemu less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076135" comment="xen-tools less than 3.2.3_17040_44-0.7.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076136" comment="xen less than 3.2.3_17040_44-0.7.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5525</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5525" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5525" source="CVE"/>
	<description>
	The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.
	</description>
 </metadata>
<!-- 193b206adfdaf6da1ce1c5ced79e9f29 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076124" comment="xen-devel less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076125" comment="xen-doc-html less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076126" comment="xen-doc-pdf less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076127" comment="xen-doc-ps less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076128" comment="xen-kmp-bigsmp less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076139" comment="xen-kmp-debug less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076129" comment="xen-kmp-default less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076140" comment="xen-kmp-kdump less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076141" comment="xen-kmp-kdumppae less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076130" comment="xen-kmp-smp less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076142" comment="xen-kmp-vmi less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076143" comment="xen-kmp-vmipae less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076131" comment="xen-libs-32bit less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076132" comment="xen-libs less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076133" comment="xen-tools-domU less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076134" comment="xen-tools-ioemu less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076135" comment="xen-tools less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076136" comment="xen less than 3.2.3_17040_44-0.7.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076124" comment="xen-devel less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076139" comment="xen-kmp-debug less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076140" comment="xen-kmp-kdump less than 3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076131" comment="xen-libs-32bit less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076132" comment="xen-libs less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076134" comment="xen-tools-ioemu less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076135" comment="xen-tools less than 3.2.3_17040_44-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076136" comment="xen less than 3.2.3_17040_44-0.7.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5526</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5526" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5526" source="CVE"/>
	<description>
	CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm.
	</description>
 </metadata>
<!-- ed1929d51b82752f08399dada0ae2769 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076769" comment="perl-32bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076779" comment="perl-64bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076780" comment="perl-x86 less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076770" comment="perl less than 5.8.8-14.21.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5530</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5530" source="CVE"/>
	<description>
	The (1) pcmd and (2) pmlogger init scripts in Performance Co-Pilot (PCP) before 3.6.10 allow local users to overwrite arbitrary files via a symlink attack on a /var/tmp/##### temporary file.
	</description>
 </metadata>
<!-- 86d59a2714828a99a56a3fdba3660c73 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076353" comment="permissions less than 2013.1.7-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076357" comment="libpcp3 less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076367" comment="pcp-devel less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076358" comment="pcp-import-iostat2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076359" comment="pcp-import-mrtg2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076360" comment="pcp-import-sar2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076361" comment="pcp-import-sheet2pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076362" comment="pcp less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076363" comment="perl-PCP-LogImport less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076364" comment="perl-PCP-LogSummary less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076365" comment="perl-PCP-MMV less than 3.6.10-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076366" comment="perl-PCP-PMDA less than 3.6.10-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5568</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5568" source="CVE"/>
	<description>
	Apache Tomcat through 7.0.x allows remote attackers to cause a denial of service (daemon outage) via partial HTTP requests, as demonstrated by Slowloris.
	</description>
 </metadata>
<!-- cb28ebabe41577ce7048bf358c8a158f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076477" comment="tomcat5-admin-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076478" comment="tomcat5-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076479" comment="tomcat5 less than 5.5.27-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5581</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5581" source="CVE"/>
	<description>
	Stack-based buffer overflow in tif_dir.c in LibTIFF before 4.0.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DOTRANGE tag in a TIFF image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- e82a9ac77700ce38cd74ae7a74f81150 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076448" comment="libtiff-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076462" comment="libtiff-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076463" comment="libtiff-devel-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076464" comment="libtiff-devel-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076449" comment="libtiff-devel less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076465" comment="libtiff-x86 less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076450" comment="libtiff less than 3.8.2-5.32.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076463" comment="libtiff-devel-32bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076464" comment="libtiff-devel-64bit less than 3.8.2-5.32.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076449" comment="libtiff-devel less than 3.8.2-5.32.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5594</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5594" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6054.  Reason: This candidate is a reservation duplicate of CVE-2012-6054.  Notes: All CVE users should reference CVE-2012-6054 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5595</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5595" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2012-6056.  Reason: This candidate is a reservation duplicate of CVE-2012-6056.  Notes: All CVE users should reference CVE-2012-6056 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5643</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5643" source="CVE"/>
	<description>
	Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials.
	</description>
 </metadata>
<!-- 850346f40016e8457b0ca1c737fbfd5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076564" comment="squid less than 2.5.STABLE12-18.13.982.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5656</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2012-5656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5656" source="CVE"/>
	<description>
	The rasterization process in Inkscape before 0.48.4 allows local users to read arbitrary files via an external entity in a SVG file, aka an XML external entity (XXE) injection attack.
	</description>
 </metadata>
<!-- d5a97ae9b73a7b9ad83db7b862966e52 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076677" comment="inkscape less than 0.43-20.22.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5668</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5668" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5668" source="CVE"/>
	<description>
	FreeType before 2.4.11 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to BDF fonts and the improper handling of an "allocation error" in the bdf_free_font function.
	</description>
 </metadata>
<!-- dae01abeb154b602c10bb1999a8eb916 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076451" comment="freetype2-32bit less than 2.1.10-18.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076466" comment="freetype2-64bit less than 2.1.10-18.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076452" comment="freetype2-devel-32bit less than 2.1.10-18.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076467" comment="freetype2-devel-64bit less than 2.1.10-18.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076453" comment="freetype2-devel less than 2.1.10-18.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076468" comment="freetype2-x86 less than 2.1.10-18.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076454" comment="freetype2 less than 2.1.10-18.31.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076455" comment="ft2demos less than 2.1.10-19.31.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5829</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5829" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsWindow::OnExposeEvent function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			</criteria>
		</criteria></criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5830</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5830" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 on Mac OS X allows remote attackers to execute arbitrary code via an HTML document.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5833</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5833" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5833" source="CVE"/>
	<description>
	The texImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via function calls involving certain values of the level parameter.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5835</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5835" source="CVE"/>
	<description>
	Integer overflow in the WebGL subsystem in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (invalid write operation) via crafted data.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5836</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5836" source="CVE"/>
	<description>
	Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving the setting of Cascading Style Sheets (CSS) properties in conjunction with SVG text.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5837</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5837" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5837" source="CVE"/>
	<description>
	The Web Developer Toolbar in Mozilla Firefox before 17.0 executes script with chrome privileges, which allows user-assisted remote attackers to conduct cross-site scripting (XSS) attacks via a crafted string.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5838</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5838" source="CVE"/>
	<description>
	The copyTexImage2D implementation in the WebGL subsystem in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via large image dimensions.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5839</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5839" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5839" source="CVE"/>
	<description>
	Heap-based buffer overflow in the gfxShapedWord::CompressedGlyph::IsClusterStart function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5840</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5840" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTextEditorState::PrepareEditor function in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors, a different vulnerability than CVE-2012-4214.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5841</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5841" source="CVE"/>
	<description>
	Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 implement cross-origin wrappers with a filtering behavior that does not properly restrict write actions, which allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5842</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5842" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Firefox ESR 10.x before 10.0.11, Thunderbird before 17.0, Thunderbird ESR 10.x before 10.0.11, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5843</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5843" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 17.0, Thunderbird before 17.0, and SeaMonkey before 2.14 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 8f4e08deca5960ae494ddceeb6c10708 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076094" comment="MozillaFirefox-translations less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076095" comment="MozillaFirefox less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076096" comment="mozilla-nss-32bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076118" comment="mozilla-nss-64bit less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076097" comment="mozilla-nss-devel less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076119" comment="mozilla-nss-x86 less than 3.14-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076099" comment="mozilla-nss less than 3.14-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076120" comment="MozillaFirefox-branding-upstream less than 10.0.11-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076098" comment="mozilla-nss-tools less than 3.14-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5885</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5885" source="CVE"/>
	<description>
	The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
	</description>
 </metadata>
<!-- cb28ebabe41577ce7048bf358c8a158f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076477" comment="tomcat5-admin-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076478" comment="tomcat5-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076479" comment="tomcat5 less than 5.5.27-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5886</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5886" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5886" source="CVE"/>
	<description>
	The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
	</description>
 </metadata>
<!-- cb28ebabe41577ce7048bf358c8a158f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076477" comment="tomcat5-admin-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076478" comment="tomcat5-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076479" comment="tomcat5 less than 5.5.27-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20125887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-5887</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-5887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5887" source="CVE"/>
	<description>
	The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
	</description>
 </metadata>
<!-- cb28ebabe41577ce7048bf358c8a158f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076477" comment="tomcat5-admin-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076478" comment="tomcat5-webapps less than 5.5.27-0.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076479" comment="tomcat5 less than 5.5.27-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6054</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6054" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6054" source="CVE"/>
	<description>
	The dissect_sflow_245_address_type function in epan/dissectors/packet-sflow.c in the sFlow dissector in Wireshark 1.8.x before 1.8.4 does not properly handle length calculations for an invalid IP address type, which allows remote attackers to cause a denial of service (infinite loop) via a packet that is neither IPv4 nor IPv6.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6056</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6056" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6056" source="CVE"/>
	<description>
	Integer overflow in the dissect_sack_chunk function in epan/dissectors/packet-sctp.c in the SCTP dissector in Wireshark 1.8.x before 1.8.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted Duplicate TSN count.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6085</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6085" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6085" source="CVE"/>
	<description>
	The read_block function in g10/import.c in GnuPG 1.4.x before 1.4.13 and 2.0.x through 2.0.19, when importing a key, allows remote attackers to corrupt the public keyring database or cause a denial of service (application crash) via a crafted length field of an OpenPGP packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3fc2b24dc90bda3b61202a7c4ffc0814 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077455" comment="gpg less than 1.4.2-23.21.1"/>
	</criteria>
	<!-- acd92f9dee2e9699d6f15796e9111ead -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
	<!-- c63e1c0dad4c5e8848b14230545d1ec2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077456" comment="gpg2 less than 1.9.18-17.23.1"/>
	</criteria>
	<!-- e1dc4237303f900680735301818d6d76 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6096</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6096" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6096" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
	</description>
 </metadata>
<!-- c415b3faaa5c48714f260b9d0773f56a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076701" comment="nagios-www less than 2.6-13.26.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076702" comment="nagios less than 2.6-13.26.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6139</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6139" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6139" source="CVE"/>
	<description>
	libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4e6a2ff81c440983e4a78087fc7ea548 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
	<!-- 8f27549488997eeff15597ab0b7a9c1a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
	<!-- f2c4e439c56211a8185d4b4e23db8694 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077111" comment="libxslt-32bit less than 1.1.15-15.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077124" comment="libxslt-64bit less than 1.1.15-15.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077112" comment="libxslt-devel-32bit less than 1.1.15-15.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077125" comment="libxslt-devel-64bit less than 1.1.15-15.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077113" comment="libxslt-devel less than 1.1.15-15.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077126" comment="libxslt-x86 less than 1.1.15-15.20.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077114" comment="libxslt less than 1.1.15-15.20.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077127" comment="libxslt-python less than 1.1.15-15.20.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6329</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6329" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6329" source="CVE"/>
	<description>
	The _compile function in Maketext.pm in the Locale::Maketext implementation in Perl before 5.17.7 does not properly handle backslashes and fully qualified method names during compilation of bracket notation, which allows context-dependent attackers to execute arbitrary commands via crafted input to an application that accepts translation strings from users, as demonstrated by the TWiki application before 5.1.3, and the Foswiki application 1.0.x through 1.0.10 and 1.1.x through 1.1.6.
	</description>
 </metadata>
<!-- ed1929d51b82752f08399dada0ae2769 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076769" comment="perl-32bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076779" comment="perl-64bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076780" comment="perl-x86 less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076770" comment="perl less than 5.8.8-14.21.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6537</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6537" source="CVE"/>
	<description>
	net/xfrm/xfrm_user.c in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6539</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6539" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6539" source="CVE"/>
	<description>
	The dev_ifconf function in net/socket.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6540</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6540" source="CVE"/>
	<description>
	The do_ip_vs_get_ctl function in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 3.6 does not initialize a certain structure for IP_VS_SO_GET_TIMEOUT commands, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6541" source="CVE"/>
	<description>
	The ccid3_hc_tx_getsockopt function in net/dccp/ccids/ccid3.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6542</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6542" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6542" source="CVE"/>
	<description>
	The llc_ui_getname function in net/llc/af_llc.c in the Linux kernel before 3.6 has an incorrect return value in certain circumstances, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that leverages an uninitialized pointer argument.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6544</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6544" source="CVE"/>
	<description>
	The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2) HCI implementation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6545</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6545" source="CVE"/>
	<description>
	The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6546</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6546" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6546" source="CVE"/>
	<description>
	The ATM implementation in the Linux kernel before 3.6 does not initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6547" source="CVE"/>
	<description>
	The __tun_chr_ioctl function in drivers/net/tun.c in the Linux kernel before 3.6 does not initialize a certain structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6549" source="CVE"/>
	<description>
	The isofs_export_encode_fh function in fs/isofs/export.c in the Linux kernel before 3.6 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6656</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6656" source="CVE"/>
	<description>
	iconvdata/ibm930.c in GNU C Library (aka glibc) before 2.16 allows context-dependent attackers to cause a denial of service (out-of-bounds read) via a multibyte character value of "0xffff" to the iconv function when converting IBM930 encoded data to UTF-8.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 190862be14e3ed91b361e0b0a66e292a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
		</criteria>
	</criteria>
	<!-- 1ccbe69cba5cc8835258525263c85657 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105614" comment="glibc-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105615" comment="glibc-devel-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105616" comment="glibc-devel less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105617" comment="glibc-html less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105618" comment="glibc-i18ndata less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105619" comment="glibc-info less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105620" comment="glibc-locale-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105621" comment="glibc-locale less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105622" comment="glibc-profile-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105623" comment="glibc-profile less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105624" comment="glibc less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105625" comment="nscd less than 2.4-31.115.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20126657" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2012-6657</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2012-6657" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657" source="CVE"/>
	<description>
	The sock_setsockopt function in net/core/sock.c in the Linux kernel before 3.5.7 does not ensure that a keepalive action is associated with a stream socket, which allows local users to cause a denial of service (system crash) by leveraging the ability to create a raw socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0149</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0149" source="CVE"/>
	<description>
	The OSPF implementation in Cisco IOS 12.0 through 12.4 and 15.0 through 15.3, IOS-XE 2.x through 3.9.xS, ASA and PIX 7.x through 9.1, FWSM, NX-OS, and StarOS before 14.0.50488 does not properly validate Link State Advertisement (LSA) type 1 packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a (1) unicast or (2) multicast packet, aka Bug IDs CSCug34485, CSCug34469, CSCug39762, CSCug63304, and CSCug39795.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6cc544cafa35bad90a6c69b6b80644c6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104655" comment="quagga-devel less than 0.99.9-14.17.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104656" comment="quagga less than 0.99.9-14.17.12"/>
		</criteria>
	</criteria>
	<!-- 718958de9702ca0d22de230f19958498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104655" comment="quagga-devel less than 0.99.9-14.17.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104656" comment="quagga less than 0.99.9-14.17.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0160</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0160" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160" source="CVE"/>
	<description>
	The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b51bf3e02179f8f70c7b2ada2571a2d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077027" comment="kernel-bigsmp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077049" comment="kernel-kdumppae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077050" comment="kernel-vmi less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077051" comment="kernel-vmipae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 7cf4de409b28c5f187bc1e9f71ccd64f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ac5626f6e7f483c6dac1cc5fe253fcf9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ba0e542087a9075aed8c17a29d5f1cb8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
		</criteria>
	</criteria>
	<!-- dba6fc0fdae22199ec260695a6d2179e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077052" comment="kernel-iseries64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077053" comment="kernel-ppc64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0166</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0166" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0166" source="CVE"/>
	<description>
	OpenSSL before 0.9.8y, 1.0.0 before 1.0.0k, and 1.0.1 before 1.0.1d does not properly perform signature verification for OCSP responses, which allows remote OCSP servers to cause a denial of service (NULL pointer dereference and application crash) via an invalid key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 42741ff95d9d4f1604b9b2d2fc5ec078 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076919" comment="openssl-32bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076929" comment="openssl-64bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076920" comment="openssl-devel-32bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076930" comment="openssl-devel-64bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076921" comment="openssl-devel less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076931" comment="openssl-doc less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076932" comment="openssl-x86 less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076922" comment="openssl less than 0.9.8a-18.76.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076931" comment="openssl-doc less than 0.9.8a-18.76.1"/>
		</criteria></criteria>
	<!-- c554034a3af450bcfad676917143134b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104640" comment="openssl-32bit less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104641" comment="openssl-devel-32bit less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104642" comment="openssl-devel less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104643" comment="openssl-doc less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104644" comment="openssl less than 0.9.8a-18.45.69.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0169</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0169" source="CVE"/>
	<description>
	The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, OpenJDK, PolarSSL, and other products, do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, aka the "Lucky Thirteen" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- 42741ff95d9d4f1604b9b2d2fc5ec078 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076919" comment="openssl-32bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076929" comment="openssl-64bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076920" comment="openssl-devel-32bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076930" comment="openssl-devel-64bit less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076921" comment="openssl-devel less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076931" comment="openssl-doc less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076932" comment="openssl-x86 less than 0.9.8a-18.76.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076922" comment="openssl less than 0.9.8a-18.76.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076931" comment="openssl-doc less than 0.9.8a-18.76.1"/>
		</criteria></criteria>
	<!-- 5af9a7844c94f8453bb2fcbdd610b058 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077079" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077080" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077081" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077082" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077083" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077084" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077085" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077086" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077087" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077088" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077089" comment="java-1_6_0-ibm less than 1.6.0_sr13.1-0.14.1"/>
		</criteria>
	</criteria>
	<!-- c554034a3af450bcfad676917143134b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104640" comment="openssl-32bit less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104641" comment="openssl-devel-32bit less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104642" comment="openssl-devel less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104643" comment="openssl-doc less than 0.9.8a-18.45.69.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104644" comment="openssl less than 0.9.8a-18.45.69.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0188</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0188" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-0189, CVE-2013-0191.  Reason: this identifier was intended for one issue, but it was inadvertently associated with multiple issues.  Notes: All CVE users should consult CVE-2013-0189 and CVE-2013-0191 to determine which ID is appropriate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 850346f40016e8457b0ca1c737fbfd5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076564" comment="squid less than 2.5.STABLE12-18.13.982.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0189</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0189" source="CVE"/>
	<description>
	cachemgr.cgi in Squid 3.1.x and 3.2.x, possibly 3.1.22, 3.2.4, and other versions, allows remote attackers to cause a denial of service (resource consumption) via a crafted request.  NOTE: this issue is due to an incorrect fix for CVE-2012-5643, possibly involving an incorrect order of arguments or incorrect comparison.
	</description>
 </metadata>
<!-- 850346f40016e8457b0ca1c737fbfd5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076564" comment="squid less than 2.5.STABLE12-18.13.982.4.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0213</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0213" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0213" source="CVE"/>
	<description>
	The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element.
	</description>
 </metadata>
<!-- 1d50d01aa74b22f0c8645692c12273df -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076550" comment="cifs-mount less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076551" comment="ldapsmb less than 1.34b-25.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076589" comment="libmsrpc-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076590" comment="libmsrpc less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076552" comment="libsmbclient-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076591" comment="libsmbclient-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076553" comment="libsmbclient-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076592" comment="libsmbclient-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076554" comment="libsmbclient less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076555" comment="samba-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076593" comment="samba-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076556" comment="samba-client-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076594" comment="samba-client-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076595" comment="samba-client-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076557" comment="samba-client less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076558" comment="samba-doc less than 3.0.36-0.12.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076559" comment="samba-krb-printing less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076596" comment="samba-python less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076560" comment="samba-vscan less than 0.3.6b-43.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076561" comment="samba-winbind-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076597" comment="samba-winbind-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076598" comment="samba-winbind-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076562" comment="samba-winbind less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076599" comment="samba-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076563" comment="samba less than 3.0.36-0.13.24.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076589" comment="libmsrpc-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076590" comment="libmsrpc less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076553" comment="libsmbclient-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076600" comment="libsmbsharemodes-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076601" comment="libsmbsharemodes less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076596" comment="samba-python less than 3.0.36-0.13.24.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0214</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 GPLv3 Extras for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0214" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0214" source="CVE"/>
	<description>
	Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions.
	</description>
 </metadata>
<!-- 1d50d01aa74b22f0c8645692c12273df -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076550" comment="cifs-mount less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076551" comment="ldapsmb less than 1.34b-25.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076589" comment="libmsrpc-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076590" comment="libmsrpc less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076552" comment="libsmbclient-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076591" comment="libsmbclient-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076553" comment="libsmbclient-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076592" comment="libsmbclient-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076554" comment="libsmbclient less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076555" comment="samba-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076593" comment="samba-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076556" comment="samba-client-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076594" comment="samba-client-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076595" comment="samba-client-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076557" comment="samba-client less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076558" comment="samba-doc less than 3.0.36-0.12.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076559" comment="samba-krb-printing less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076596" comment="samba-python less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076560" comment="samba-vscan less than 0.3.6b-43.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076561" comment="samba-winbind-32bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076597" comment="samba-winbind-64bit less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076598" comment="samba-winbind-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076562" comment="samba-winbind less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076599" comment="samba-x86 less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076563" comment="samba less than 3.0.36-0.13.24.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076589" comment="libmsrpc-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076590" comment="libmsrpc less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076553" comment="libsmbclient-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076600" comment="libsmbsharemodes-devel less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076601" comment="libsmbsharemodes less than 3.0.36-0.13.24.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076596" comment="samba-python less than 3.0.36-0.13.24.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0216</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0216" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216" source="CVE"/>
	<description>
	The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b51bf3e02179f8f70c7b2ada2571a2d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077027" comment="kernel-bigsmp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077049" comment="kernel-kdumppae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077050" comment="kernel-vmi less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077051" comment="kernel-vmipae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7cf4de409b28c5f187bc1e9f71ccd64f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ac5626f6e7f483c6dac1cc5fe253fcf9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ba0e542087a9075aed8c17a29d5f1cb8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
		</criteria>
	</criteria>
	<!-- dba6fc0fdae22199ec260695a6d2179e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077052" comment="kernel-iseries64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077053" comment="kernel-ppc64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0231</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231" source="CVE"/>
	<description>
	The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b51bf3e02179f8f70c7b2ada2571a2d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077027" comment="kernel-bigsmp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077049" comment="kernel-kdumppae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077050" comment="kernel-vmi less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077051" comment="kernel-vmipae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 7cf4de409b28c5f187bc1e9f71ccd64f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ac5626f6e7f483c6dac1cc5fe253fcf9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ba0e542087a9075aed8c17a29d5f1cb8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
		</criteria>
	</criteria>
	<!-- dba6fc0fdae22199ec260695a6d2179e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077052" comment="kernel-iseries64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077053" comment="kernel-ppc64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0242</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0242" source="CVE"/>
	<description>
	Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.
	</description>
 </metadata>
<!-- 190862be14e3ed91b361e0b0a66e292a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0268</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0268" source="CVE"/>
	<description>
	The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b51bf3e02179f8f70c7b2ada2571a2d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077027" comment="kernel-bigsmp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077049" comment="kernel-kdumppae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077050" comment="kernel-vmi less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077051" comment="kernel-vmipae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 7cf4de409b28c5f187bc1e9f71ccd64f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ac5626f6e7f483c6dac1cc5fe253fcf9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ba0e542087a9075aed8c17a29d5f1cb8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
		</criteria>
	</criteria>
	<!-- dba6fc0fdae22199ec260695a6d2179e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077052" comment="kernel-iseries64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077053" comment="kernel-ppc64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0271</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-0271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0271" source="CVE"/>
	<description>
	The MXit protocol plugin in libpurple in Pidgin before 2.10.7 might allow remote attackers to create or overwrite files via a crafted (1) mxit or (2) mxit/imagestrips pathname.
	</description>
 </metadata>
<!-- 51b5f7c142afdeafafca33c1a4681683 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076733" comment="finch-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076718" comment="finch less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076734" comment="libpurple-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076719" comment="libpurple less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076735" comment="pidgin-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076720" comment="pidgin less than 2.6.6-0.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0272</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-0272" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0272" source="CVE"/>
	<description>
	Buffer overflow in http.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.7 allows remote servers to execute arbitrary code via a long HTTP header.
	</description>
 </metadata>
<!-- 51b5f7c142afdeafafca33c1a4681683 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076733" comment="finch-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076718" comment="finch less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076734" comment="libpurple-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076719" comment="libpurple less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076735" comment="pidgin-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076720" comment="pidgin less than 2.6.6-0.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0273</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-0273" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0273" source="CVE"/>
	<description>
	sametime.c in the Sametime protocol plugin in libpurple in Pidgin before 2.10.7 does not properly terminate long user IDs, which allows remote servers to cause a denial of service (application crash) via a crafted packet.
	</description>
 </metadata>
<!-- 51b5f7c142afdeafafca33c1a4681683 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076733" comment="finch-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076718" comment="finch less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076734" comment="libpurple-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076719" comment="libpurple less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076735" comment="pidgin-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076720" comment="pidgin less than 2.6.6-0.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0274</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-0274" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0274" source="CVE"/>
	<description>
	upnp.c in libpurple in Pidgin before 2.10.7 does not properly terminate long strings in UPnP responses, which allows remote attackers to cause a denial of service (application crash) by leveraging access to the local network.
	</description>
 </metadata>
<!-- 51b5f7c142afdeafafca33c1a4681683 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076733" comment="finch-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076718" comment="finch less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076734" comment="libpurple-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076719" comment="libpurple less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076735" comment="pidgin-devel less than 2.6.6-0.20.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076720" comment="pidgin less than 2.6.6-0.20.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0338</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0338" source="CVE"/>
	<description>
	libxml2 2.9.0 and earlier allows context-dependent attackers to cause a denial of service (CPU and memory consumption) via an XML file containing an entity declaration with long replacement text and many references to this entity, aka "internal entity expansion" with linear complexity.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- dfd9d469ee1615731b1403a0c070bfa5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077139" comment="libxml2-32bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077147" comment="libxml2-64bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077140" comment="libxml2-devel-32bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077148" comment="libxml2-devel-64bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077141" comment="libxml2-devel less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077142" comment="libxml2-python less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077149" comment="libxml2-x86 less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077143" comment="libxml2 less than 2.6.23-15.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077150" comment="libxml2-test less than 2.6.23-15.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0339</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339" source="CVE"/>
	<description>
	libxml2 through 2.9.1 does not properly handle external entities expansion unless an application developer uses the xmlSAX2ResolveEntity or xmlSetExternalEntityLoader function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue.  NOTE: it could be argued that because libxml2 already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed and each affected application would need its own CVE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- dfd9d469ee1615731b1403a0c070bfa5 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077139" comment="libxml2-32bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077147" comment="libxml2-64bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077140" comment="libxml2-devel-32bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077148" comment="libxml2-devel-64bit less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077141" comment="libxml2-devel less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077142" comment="libxml2-python less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077149" comment="libxml2-x86 less than 2.6.23-15.37.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077143" comment="libxml2 less than 2.6.23-15.37.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077150" comment="libxml2-test less than 2.6.23-15.37.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0343</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0343" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0343" source="CVE"/>
	<description>
	The ipv6_create_tempaddr function in net/ipv6/addrconf.c in the Linux kernel through 3.8 does not properly handle problems with the generation of IPv6 temporary addresses, which allows remote attackers to cause a denial of service (excessive retries and address-generation outage), and consequently obtain sensitive information, via ICMPv6 Router Advertisement (RA) messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0351</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0351" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0401</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0401" source="CVE"/>
	<description>
	The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to execute arbitrary code via vectors related to AWT, as demonstrated by Ben Murphy during a Pwn2Own competition at CanSecWest 2013.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to invocation of the system class loader by the sun.awt.datatransfer.ClassLoaderObjectInputStream class, which allows remote attackers to bypass Java sandbox restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0409</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0409" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38 allows remote attackers to affect confidentiality via vectors related to JMX.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0419</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0419" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0423</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0423" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0424</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0424" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to RMI. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to cross-site scripting (XSS) in the sun.rmi.transport.proxy CGIHandler class that does not properly handle error messages in a (1) command or (2) port number.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0425</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0425" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0425" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0428 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0426</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0426" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0428.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect "access control checks" in the logging API that allow remote attackers to bypass Java sandbox restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0427</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0427" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Libraries.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to interrupt certain threads that should not be interrupted.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0428</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0428" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-0425 and CVE-2013-0426.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "incorrect checks for proxy classes" in the Reflection API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0432</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0432" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient clipboard access premission checks."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0433</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0433" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect integrity via unknown vectors related to Networking.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to avoid triggering an exception during the deserialization of invalid InetSocketAddress data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0434</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0434" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0434" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAXP.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the public declaration of the loadPropertyFile method in the JAXP FuncSystemProperty class, which allows remote attackers to obtain sensitive information.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0435</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0435" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality via vectors related to JAX-WS.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper restriction of com.sun.xml.internal packages and "Better handling of UI elements."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0438</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0438" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0440</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0440" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU.  Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0441</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0441" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0441" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-1476 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via certain methods that should not be serialized, aka "missing serialization restriction."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0442</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0442" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0443</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0443" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect validation of Diffie-Hellman keys, which allows remote attackers to conduct a "small subgroup attack" to force the use of weak session keys or obtain sensitive information about the private key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0445</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0445" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an improper check of "privileges of the code" that bypasses the sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0446</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0446" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than other CVEs listed in the February 2013 CPU.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0450</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0450" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, and 5.0 through Update 38, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper checks of "access control context" in the JMX RequiredModelMBean class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0485</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0485" source="CVE"/>
	<description>
	Unspecified vulnerability in IBM Java SDK 7 before SR4-FP1, 6 before SR13-FP1, 5.0 before SR16-FP1, and 1.4.2 before SR13-FP16 has unknown impact and attack vectors related to Class Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5af9a7844c94f8453bb2fcbdd610b058 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077079" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077080" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077081" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077082" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077083" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077084" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077085" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077086" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077087" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077088" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077089" comment="java-1_6_0-ibm less than 1.6.0_sr13.1-0.14.1"/>
		</criteria>
	</criteria>
	<!-- 68dff9a90877961ddadf162e06d37083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077068" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077090" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077069" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077070" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077072" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077073" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077074" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077075" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077076" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077078" comment="java-1_5_0-ibm less than 1.5.0_sr16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 7a55fbf728115132117fd64c8347049a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077091" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077092" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077093" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077094" comment="java-1_4_2-ibm less than 1.4.2_sr13.16-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0743</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0743" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0744</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0744" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0744" source="CVE"/>
	<description>
	Use-after-free vulnerability in the TableBackgroundPainter::TableBackgroundData::Destroy function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an HTML document with a table containing many columns and column groups.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0745</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0745" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0745" source="CVE"/>
	<description>
	The AutoWrapperChanger class in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly interact with garbage collection, which allows remote attackers to execute arbitrary code via a crafted HTML document referencing JavaScript objects.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0746</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0746" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0746" source="CVE"/>
	<description>
	Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 do not properly implement quickstubs that use the jsval data type for their return values, which allows remote attackers to execute arbitrary code or cause a denial of service (compartment mismatch and application crash) via crafted JavaScript code that is not properly handled during garbage collection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0747</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0747" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0747" source="CVE"/>
	<description>
	The gPluginHandler.handleEvent function in the plugin handler in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not properly enforce the Same Origin Policy, which allows remote attackers to conduct clickjacking attacks via crafted JavaScript code that listens for a mutation event.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0748</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0748" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0748" source="CVE"/>
	<description>
	The XBL.__proto__.toString implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 makes it easier for remote attackers to bypass the ASLR protection mechanism by calling the toString function of an XBL object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0749</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0749" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0749" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0750</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0750" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0750" source="CVE"/>
	<description>
	Integer overflow in the JavaScript implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted string concatenation, leading to improper memory allocation and a heap-based buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0751</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0751" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0751" source="CVE"/>
	<description>
	Mozilla Firefox before 18.0 on Android and SeaMonkey before 2.15 do not restrict a touch event to a single IFRAME element, which allows remote attackers to obtain sensitive information or possibly conduct cross-site scripting (XSS) attacks via a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0752</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0752" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0752" source="CVE"/>
	<description>
	Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XBL file with multiple bindings that have SVG content.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0753</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0753" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0753" source="CVE"/>
	<description>
	Use-after-free vulnerability in the serializeToStream implementation in the XMLSerializer component in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via crafted web content.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0754</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0754" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0754" source="CVE"/>
	<description>
	Use-after-free vulnerability in the ListenerManager implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors involving the triggering of garbage collection after memory allocation for listener objects.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130755" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0755</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0755" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0755" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozVibrate implementation in the Vibrate library in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via vectors related to the domDoc pointer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0756</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0756" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0756" source="CVE"/>
	<description>
	Use-after-free vulnerability in the obj_toSource function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted web page referencing JavaScript Proxy objects that are not properly handled during garbage collection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0757</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0757" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0757" source="CVE"/>
	<description>
	The Chrome Object Wrapper (COW) implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not prevent modifications to the prototype of an object, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges by referencing Object.prototype.__proto__ in a crafted HTML document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0758</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0758" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0758" source="CVE"/>
	<description>
	Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging improper interaction between plugin objects and SVG elements.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0759</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0759" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0759" source="CVE"/>
	<description>
	Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to spoof the address bar via vectors involving authentication information in the userinfo field of a URL, in conjunction with a 204 (aka No Content) HTTP status code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0760</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0760" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0760" source="CVE"/>
	<description>
	Buffer overflow in the CharDistributionAnalysis::HandleOneChar function in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0761</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0761" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0761" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozilla::TrackUnionStream::EndTrack implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0762</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0762" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0762" source="CVE"/>
	<description>
	Use-after-free vulnerability in the imgRequest::OnStopFrame function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0763</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0763" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0763" source="CVE"/>
	<description>
	Use-after-free vulnerability in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to Mesa drivers and a resized WebGL canvas.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0764</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0764" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0764" source="CVE"/>
	<description>
	The nsSOCKSSocketInfo::ConnectToProxy function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 does not ensure thread safety for SSL sessions, which allows remote attackers to execute arbitrary code via crafted data, as demonstrated by e-mail message data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0765</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0765" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0765" source="CVE"/>
	<description>
	Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 do not prevent multiple wrapping of WebIDL objects, which allows remote attackers to bypass intended access restrictions via unspecified vectors.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0766</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0766" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0766" source="CVE"/>
	<description>
	Use-after-free vulnerability in the ~nsHTMLEditRules implementation in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0767</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0767" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0767" source="CVE"/>
	<description>
	The nsSVGPathElement::GetPathLengthScale function in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
	</description>
 </metadata>
<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0768</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0768" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0768" source="CVE"/>
	<description>
	Stack-based buffer overflow in the Canvas implementation in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.2, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.2, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via an HTML document that specifies invalid width and height values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0769</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0769" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0769" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Firefox ESR 10.x before 10.0.12 and 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 10.x before 10.0.12 and 17.x before 17.0.1, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0770</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0770" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0770" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 18.0, Thunderbird before 17.0.2, and SeaMonkey before 2.15 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0771</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0771" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0771" source="CVE"/>
	<description>
	Heap-based buffer overflow in the gfxTextRun::ShrinkToLigatureBoundaries function in Mozilla Firefox before 18.0, Firefox ESR 17.x before 17.0.1, Thunderbird before 17.0.2, Thunderbird ESR 17.x before 17.0.1, and SeaMonkey before 2.15 allows remote attackers to execute arbitrary code via a crafted document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8d645904d43fff2d5195e42ae81f6d59 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104645" comment="MozillaFirefox-branding-SLED less than 7-0.8.46"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104646" comment="MozillaFirefox-translations less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104647" comment="MozillaFirefox less than 10.0.12-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104648" comment="firefox3-cairo-32bit less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104649" comment="firefox3-cairo less than 1.2.4-0.8.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104650" comment="firefox3-gtk2-32bit less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104651" comment="firefox3-gtk2 less than 2.10.6-0.12.21"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104652" comment="firefox3-pango-32bit less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104653" comment="firefox3-pango less than 1.14.5-0.12.178"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
		</criteria>
	</criteria>
	<!-- dbe0a7820fa20c51a9e400f8a2814641 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076318" comment="MozillaFirefox-translations less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076319" comment="MozillaFirefox less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076320" comment="mozilla-nspr-32bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076336" comment="mozilla-nspr-64bit less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076321" comment="mozilla-nspr-devel less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076337" comment="mozilla-nspr-x86 less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076322" comment="mozilla-nspr less than 4.9.4-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076323" comment="mozilla-nss-32bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076338" comment="mozilla-nss-64bit less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076324" comment="mozilla-nss-devel less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076339" comment="mozilla-nss-x86 less than 3.14.1-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076326" comment="mozilla-nss less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076340" comment="MozillaFirefox-branding-upstream less than 10.0.12-0.6.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076325" comment="mozilla-nss-tools less than 3.14.1-0.6.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0772</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0772" source="CVE"/>
	<description>
	The RasterImage::DrawFrameTo function in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read and application crash) via a crafted GIF image.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0773</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0773" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0773" source="CVE"/>
	<description>
	The Chrome Object Wrapper (COW) and System Only Wrapper (SOW) implementations in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent modifications to a prototype, which allows remote attackers to obtain sensitive information from chrome objects or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0774</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0774" source="CVE"/>
	<description>
	Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 do not prevent JavaScript workers from reading the browser-profile directory name, which has unspecified impact and remote attack vectors.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0775</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0775" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsImageLoadingContent::OnStopContainer function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via crafted web script.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0776</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0776" source="CVE"/>
	<description>
	Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow man-in-the-middle attackers to spoof the address bar by operating a proxy server that provides a 407 HTTP status code accompanied by web script, as demonstrated by a phishing attack on an HTTPS site.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0780</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0780" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsOverflowContinuationTracker::Finish function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted document that uses Cascading Style Sheets (CSS) -moz-column-* properties.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0782</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0782" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsSaveAsCharset::DoCharsetConversion function in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0783</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0783" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Firefox ESR 17.x before 17.0.3, Thunderbird before 17.0.3, Thunderbird ESR 17.x before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0787</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0787" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsEditor::IsPreformatted function in editor/libeditor/base/nsEditor.cpp in Mozilla Firefox before 19.0.2, Firefox ESR 17.x before 17.0.4, Thunderbird before 17.0.4, Thunderbird ESR 17.x before 17.0.4, and SeaMonkey before 2.16.1 allows remote attackers to execute arbitrary code via vectors involving an execCommand call.
	</description>
 </metadata>
<!-- e8a17727b5ca4754a7c066ed49b6d2d9 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076862" comment="MozillaFirefox-branding-SLED less than 7-0.10.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076863" comment="MozillaFirefox-translations less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076864" comment="MozillaFirefox less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076866" comment="mozilla-nspr-32bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076876" comment="mozilla-nspr-64bit less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076867" comment="mozilla-nspr-devel less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076877" comment="mozilla-nspr-x86 less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076868" comment="mozilla-nspr less than 4.9.4-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076869" comment="mozilla-nss-32bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076878" comment="mozilla-nss-64bit less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076870" comment="mozilla-nss-devel less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076879" comment="mozilla-nss-x86 less than 3.14.1-0.6.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076872" comment="mozilla-nss less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076880" comment="MozillaFirefox-branding-upstream less than 17.0.4esr-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076881" comment="firefox3-python-base less than 2.6.8-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076871" comment="mozilla-nss-tools less than 3.14.1-0.6.3"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0788</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0788" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0789</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0789" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 20.0 and SeaMonkey before 2.17 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to the nsContentUtils::HoldJSObjects function and the nsAutoPtr class, and other vectors.
	</description>
 </metadata>
<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0790</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0790" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox before 20.0 on Android allows remote attackers to cause a denial of service (stack memory corruption and application crash) or possibly execute arbitrary code via unknown vectors involving a plug-in.
	</description>
 </metadata>
<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0791</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0791" source="CVE"/>
	<description>
	The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0792</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0792" source="CVE"/>
	<description>
	Mozilla Firefox before 20.0 and SeaMonkey before 2.17, when gfx.color_management.enablev4 is used, do not properly handle color profiles during PNG rendering, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (memory corruption) via a grayscale PNG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0793</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0793" source="CVE"/>
	<description>
	Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 do not ensure the correctness of the address bar during history navigation, which allows remote attackers to conduct cross-site scripting (XSS) attacks or phishing attacks by leveraging control over navigation timing.
	</description>
 </metadata>
<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0794</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0794" source="CVE"/>
	<description>
	Mozilla Firefox before 20.0 and SeaMonkey before 2.17 do not prevent origin spoofing of tab-modal dialogs, which allows remote attackers to conduct phishing attacks via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0795</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0795" source="CVE"/>
	<description>
	The System Only Wrapper (SOW) implementation in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 does not prevent use of the cloneNode method for cloning a protected node, which allows remote attackers to bypass the Same Origin Policy or possibly execute arbitrary JavaScript code with chrome privileges via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0796</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0796" source="CVE"/>
	<description>
	The WebGL subsystem in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 on Linux does not properly interact with Mesa drivers, which allows remote attackers to execute arbitrary code or cause a denial of service (free of unallocated memory) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0797</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0797" source="CVE"/>
	<description>
	Untrusted search path vulnerability in the Mozilla Updater in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, and SeaMonkey before 2.17 allows local users to gain privileges via a Trojan horse DLL file in an unspecified directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0798</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0798" source="CVE"/>
	<description>
	Mozilla Firefox before 20.0 on Android uses world-writable and world-readable permissions for the app_tmp installation directory in the local filesystem, which allows attackers to modify add-ons before installation via an application that leverages the time window during which app_tmp is used.
	</description>
 </metadata>
<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0799</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0799" source="CVE"/>
	<description>
	Buffer overflow in the Mozilla Maintenance Service in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, and Thunderbird ESR 17.x before 17.0.5 on Windows allows local users to gain privileges via crafted arguments.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0800</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0800" source="CVE"/>
	<description>
	Integer signedness error in the pixman_fill_sse2 function in pixman-sse2.c in Pixman, as distributed with Cairo and used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to execute arbitrary code via crafted values that trigger attempted use of a (1) negative box boundary or (2) negative box size, leading to an out-of-bounds write operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bb37c4e63c825ec7312dcfd2614bcab2 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009076997" comment="MozillaFirefox-branding-SLED less than 7-0.10.11"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076998" comment="MozillaFirefox-translations less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009076999" comment="MozillaFirefox less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077000" comment="mozilla-nspr-32bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077017" comment="mozilla-nspr-64bit less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077001" comment="mozilla-nspr-devel less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077018" comment="mozilla-nspr-x86 less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077002" comment="mozilla-nspr less than 4.9.6-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077003" comment="mozilla-nss-32bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077019" comment="mozilla-nss-64bit less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077004" comment="mozilla-nss-devel less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077020" comment="mozilla-nss-x86 less than 3.14.3-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077006" comment="mozilla-nss less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077021" comment="MozillaFirefox-branding-upstream less than 17.0.5esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077005" comment="mozilla-nss-tools less than 3.14.3-0.5.1"/>
			</criteria>
		</criteria></criteria>
	<!-- e59d3899bcb89883ea3648e8d94fbf3c -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077308" comment="MozillaFirefox-translations less than 17.0.6esr-0.8.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077309" comment="MozillaFirefox less than 17.0.6esr-0.8.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077312" comment="MozillaFirefox-branding-upstream less than 17.0.6esr-0.8.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0809</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0809" source="CVE"/>
	<description>
	Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5af9a7844c94f8453bb2fcbdd610b058 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077079" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077080" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077081" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077082" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077083" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077084" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077085" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077086" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077087" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077088" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077089" comment="java-1_6_0-ibm less than 1.6.0_sr13.1-0.14.1"/>
		</criteria>
	</criteria>
	<!-- 68dff9a90877961ddadf162e06d37083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077068" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077090" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077069" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077070" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077072" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077073" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077074" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077075" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077076" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077078" comment="java-1_5_0-ibm less than 1.5.0_sr16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 7a55fbf728115132117fd64c8347049a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077091" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077092" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077093" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077094" comment="java-1_4_2-ibm less than 1.4.2_sr13.16-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0871</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0871" source="CVE"/>
	<description>
	Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2b51bf3e02179f8f70c7b2ada2571a2d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077027" comment="kernel-bigsmp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077049" comment="kernel-kdumppae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077050" comment="kernel-vmi less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077051" comment="kernel-vmipae less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077033" comment="kernel-xenpae less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 7cf4de409b28c5f187bc1e9f71ccd64f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ac5626f6e7f483c6dac1cc5fe253fcf9 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077029" comment="kernel-smp less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077047" comment="kernel-debug less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077032" comment="kernel-xen less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria></criteria>
	<!-- ba0e542087a9075aed8c17a29d5f1cb8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
		</criteria>
	</criteria>
	<!-- dba6fc0fdae22199ec260695a6d2179e -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077028" comment="kernel-default less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077052" comment="kernel-iseries64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077053" comment="kernel-ppc64 less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077030" comment="kernel-source less than 2.6.16.60-0.101.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077031" comment="kernel-syms less than 2.6.16.60-0.101.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077048" comment="kernel-kdump less than 2.6.16.60-0.101.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20130914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-0914</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-0914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0914" source="CVE"/>
	<description>
	The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1473</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1473" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11 and 6 through Update 38 allows remote attackers to affect integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1476</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1476" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2013-0441 and CVE-2013-1475.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass Java sandbox restrictions via "certain value handler constructors."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1478</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1478" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" that can trigger an integer overflow and memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1480</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1480" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 6 and 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient validation of raster parameters" in awt_parseImage.c, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1481</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1481" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- 93cb6121fadaf694135bd63c1f9156b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- fc8b17df6be0cc8370eff53d8c702e02 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076795" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076796" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076797" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.15-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076798" comment="java-1_4_2-ibm less than 1.4.2_sr13.15-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1486</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1486" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 13 and earlier, 6 Update 39 and earlier, and 5.0 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 5ea58c1fb829cad73b10e123453189b1 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
	<!-- f3e49a4d1f2884a3b859fbf98da12261 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076851" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076875" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076852" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076853" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076855" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076856" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076857" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076858" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076859" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.0-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076861" comment="java-1_5_0-ibm less than 1.5.0_sr16.0-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1487</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1487" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE 7 Update 13 and earlier and 6 Update 39 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 219c5ead437be21a7209a3563ce35c71 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104509" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104510" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104511" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104512" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104513" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104514" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104515" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104516" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104517" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.7.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104518" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.7.7.1"/>
		</criteria>
	</criteria>
	<!-- 78075f3faaadfb1d4a70cc040d243ecc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076826" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076827" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076828" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076829" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076830" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076831" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076832" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076833" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076834" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076835" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.0-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076836" comment="java-1_6_0-ibm less than 1.6.0_sr13.0-0.13.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1491</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1491" source="CVE"/>
	<description>
	The Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to execute arbitrary code via vectors related to 2D, as demonstrated by Joshua Drake during a Pwn2Own competition at CanSecWest 2013.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1493</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1493" source="CVE"/>
	<description>
	The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5af9a7844c94f8453bb2fcbdd610b058 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077079" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077080" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077081" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077082" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077083" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077084" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077085" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077086" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077087" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077088" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.1-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077089" comment="java-1_6_0-ibm less than 1.6.0_sr13.1-0.14.1"/>
		</criteria>
	</criteria>
	<!-- 68dff9a90877961ddadf162e06d37083 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077068" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077090" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077069" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077070" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077072" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077073" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077074" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077075" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077076" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077078" comment="java-1_5_0-ibm less than 1.5.0_sr16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 7a55fbf728115132117fd64c8347049a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077091" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077092" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077093" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077094" comment="java-1_4_2-ibm less than 1.4.2_sr13.16-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1500" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality and integrity via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to weak permissions for shared memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1518</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1518" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions."
	</description>
 </metadata>
<!-- a36ba08c692a30308a29e6242e31eea2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1537</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1537" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to the default java.rmi.server.useCodebaseOnly setting of false, which allows remote attackers to perform "dynamic class downloading" and execute arbitrary code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1540</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1540" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2433.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1557</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1557" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "missing security restrictions" in the LogStream.setDefaultStream method.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1563</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1563" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1563" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1569</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1569" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "checking of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1571</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1571" source="CVE"/>
	<description>
	Unspecified vulnerability in the Javadoc component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Javadoc. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to frame injection in HTML that is generated by Javadoc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1572</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1572" source="CVE"/>
	<description>
	The dissect_oampdu_event_notification function in epan/dissectors/packet-slowprotocols.c in the IEEE 802.3 Slow Protocols dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle certain short lengths, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1573</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1573" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1573" source="CVE"/>
	<description>
	The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a large number of padding bits, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1574</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1574" source="CVE"/>
	<description>
	The dissect_bthci_eir_ad_data function in epan/dissectors/packet-bthci_cmd.c in the Bluetooth HCI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a counter variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1575</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1575" source="CVE"/>
	<description>
	The dissect_r3_cmd_alarmconfigure function in epan/dissectors/packet-assa_r3.c in the R3 dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle a certain alarm length, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1576</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1576" source="CVE"/>
	<description>
	The dissect_sdp_media_attribute function in epan/dissectors/packet-sdp.c in the SDP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly process crypto-suite parameters, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1577</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1577" source="CVE"/>
	<description>
	The dissect_sip_p_charging_func_addresses function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle offset data associated with a quoted string, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1578</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1578" source="CVE"/>
	<description>
	The dissect_pw_eth_heuristic function in epan/dissectors/packet-pw-eth.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle apparent Ethernet address values at the beginning of MPLS data, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1579</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1579" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1579" source="CVE"/>
	<description>
	The rtps_util_add_bitmap function in epan/dissectors/packet-rtps.c in the RTPS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly implement certain nested loops for processing bitmap data, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131580" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1580</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1580" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1580" source="CVE"/>
	<description>
	The dissect_cmstatus_tlv function in plugins/docsis/packet-cmstatus.c in the DOCSIS CM-STATUS dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 uses an incorrect data type for a position variable, which allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1581</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1581" source="CVE"/>
	<description>
	The dissect_pft_fec_detailed function in epan/dissectors/packet-dcp-etsi.c in the DCP-ETSI dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly handle fragment gaps, which allows remote attackers to cause a denial of service (loop) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1582</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1582" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1582" source="CVE"/>
	<description>
	The dissect_clnp function in epan/dissectors/packet-clnp.c in the CLNP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly manage an offset variable, which allows remote attackers to cause a denial of service (infinite loop or application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1583</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1583" source="CVE"/>
	<description>
	The dissect_version_4_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1584</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1584" source="CVE"/>
	<description>
	The dissect_version_5_and_6_primary_header function in epan/dissectors/packet-dtn.c in the DTN dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 accesses an inappropriate pointer, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1585</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1585" source="CVE"/>
	<description>
	epan/tvbuff.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly validate certain length values for the MS-MMC dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1586</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1586" source="CVE"/>
	<description>
	The fragment_set_tot_len function in epan/reassemble.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 does not properly determine the length of a reassembled packet for the DTLS dissector, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1588</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1588" source="CVE"/>
	<description>
	Multiple buffer overflows in the dissect_pft_fec_detailed function in the DCP-ETSI dissector in epan/dissectors/packet-dcp-etsi.c in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1589</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1589" source="CVE"/>
	<description>
	Double free vulnerability in epan/proto.c in the dissection engine in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1590</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1590" source="CVE"/>
	<description>
	Buffer overflow in the NTLMSSP dissector in Wireshark 1.6.x before 1.6.13 and 1.8.x before 1.8.5 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 00d047ef2619f2e2b31e0f986b29d382 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076539" comment="wireshark less than 1.6.13-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076546" comment="wireshark-devel less than 1.6.13-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1619</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1619" source="CVE"/>
	<description>
	The TLS implementation in GnuTLS before 2.12.23, 3.0.x before 3.0.28, and 3.1.x before 3.1.7 does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 25bff8c073ecb5178ad094a1a09f8a33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077115" comment="gnutls-32bit less than 1.2.10-13.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077128" comment="gnutls-64bit less than 1.2.10-13.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077116" comment="gnutls-devel-32bit less than 1.2.10-13.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077129" comment="gnutls-devel-64bit less than 1.2.10-13.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077117" comment="gnutls-devel less than 1.2.10-13.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077130" comment="gnutls-x86 less than 1.2.10-13.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077118" comment="gnutls less than 1.2.10-13.32.1"/>
		</criteria>
	</criteria>
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1635</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1635" source="CVE"/>
	<description>
	ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 512092ac1a057c2d35c038267a87ab52 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077816" comment="php5-tidy less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1643</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1643" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1643" source="CVE"/>
	<description>
	The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-1824.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 512092ac1a057c2d35c038267a87ab52 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077816" comment="php5-tidy less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1667</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1667" source="CVE"/>
	<description>
	The rehash mechanism in Perl 5.8.2 through 5.16.x allows context-dependent attackers to cause a denial of service (memory consumption and crash) via a crafted hash key.
	</description>
 </metadata>
<!-- ed1929d51b82752f08399dada0ae2769 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076769" comment="perl-32bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076779" comment="perl-64bit less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076780" comment="perl-x86 less than 5.8.8-14.21.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076770" comment="perl less than 5.8.8-14.21.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1682</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1682" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1682" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1684</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1684" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1684" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozilla::dom::HTMLMediaElement::LookupMediaElementURITable function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1685</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1685" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1685" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsIDocument::GetRootElement function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted web site.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1686</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1686" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozilla::ResetDir function in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1687</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1687" source="CVE"/>
	<description>
	The System Only Wrapper (SOW) and Chrome Object Wrapper (COW) implementations in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly restrict XBL user-defined functions, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges, or conduct cross-site scripting (XSS) attacks, via a crafted web site.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1690</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1690" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1690" source="CVE"/>
	<description>
	Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not properly handle onreadystatechange events in conjunction with page reloading, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted web site that triggers an attempt to execute data at an unmapped memory location.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1692</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1692" source="CVE"/>
	<description>
	Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 do not prevent the inclusion of body data in an XMLHttpRequest HEAD request, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via a crafted web site.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1693</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1693" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1693" source="CVE"/>
	<description>
	The SVG filter implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 allows remote attackers to read pixel values, and possibly bypass the Same Origin Policy and read text from a different domain, by observing timing differences in execution of filter code.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1697</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1697" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1697" source="CVE"/>
	<description>
	The XrayWrapper implementation in Mozilla Firefox before 22.0, Firefox ESR 17.x before 17.0.7, Thunderbird before 17.0.7, and Thunderbird ESR 17.x before 17.0.7 does not properly restrict use of DefaultValue for method calls, which allows remote attackers to execute arbitrary JavaScript code with chrome privileges via a crafted web site that triggers use of a user-defined (1) toString or (2) valueOf method.
	</description>
 </metadata>
<!-- 061026413fe3bb69a7f42e0b70363e4a -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077536" comment="MozillaFirefox-branding-SLED less than 7-0.10.28"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077537" comment="MozillaFirefox-translations less than 17.0.7esr-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077538" comment="MozillaFirefox less than 17.0.7esr-0.6.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077549" comment="MozillaFirefox-branding-upstream less than 17.0.7esr-0.6.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1701</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1701" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1702</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1702" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1706</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1706" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1706" source="CVE"/>
	<description>
	Stack-based buffer overflow in maintenanceservice.exe in the Mozilla Maintenance Service in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1707</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1707" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1707" source="CVE"/>
	<description>
	Stack-based buffer overflow in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 allows local users to gain privileges via a long pathname on the command line to the Mozilla Maintenance Service.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1709</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1709" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1709" source="CVE"/>
	<description>
	Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly handle the interaction between FRAME elements and history, which allows remote attackers to conduct cross-site scripting (XSS) attacks via vectors involving spoofing a relative location in a previously visited document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1710</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1710" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1710" source="CVE"/>
	<description>
	The crypto.generateCRMFRequest function in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 allows remote attackers to execute arbitrary JavaScript code or conduct cross-site scripting (XSS) attacks via vectors related to Certificate Request Message Format (CRMF) request generation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1712</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1712" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1712" source="CVE"/>
	<description>
	Multiple untrusted search path vulnerabilities in updater.exe in Mozilla Updater in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, and Thunderbird ESR 17.x before 17.0.8 on Windows 7, Windows Server 2008 R2, Windows 8, and Windows Server 2012 allow local users to gain privileges via a Trojan horse DLL in (1) the update directory or (2) the current working directory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1713</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1713" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1713" source="CVE"/>
	<description>
	Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 use an incorrect URI within unspecified comparisons during enforcement of the Same Origin Policy, which allows remote attackers to conduct cross-site scripting (XSS) attacks or install arbitrary add-ons via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1714</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1714" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1714" source="CVE"/>
	<description>
	The Web Workers implementation in Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 does not properly restrict XMLHttpRequest calls, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1717</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1717" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1717" source="CVE"/>
	<description>
	Mozilla Firefox before 23.0, Firefox ESR 17.x before 17.0.8, Thunderbird before 17.0.8, Thunderbird ESR 17.x before 17.0.8, and SeaMonkey before 2.20 do not properly restrict local-filesystem access by Java applets, which allows user-assisted remote attackers to read arbitrary files by leveraging a download to a fixed pathname or other predictable pathname.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 27187876975cda4d472350efca85775a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104679" comment="MozillaFirefox-branding-SLED less than 7-0.10.34"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104680" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104681" comment="MozillaFirefox less than 17.0.8esr-0.5.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104682" comment="mozilla-nspr-32bit less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104683" comment="mozilla-nspr-devel less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104684" comment="mozilla-nspr less than 4.9.6-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104685" comment="mozilla-nss-32bit less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104686" comment="mozilla-nss-devel less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104687" comment="mozilla-nss-tools less than 3.14.3-0.5.7"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104688" comment="mozilla-nss less than 3.14.3-0.5.7"/>
		</criteria>
	</criteria>
	<!-- 4ec72487a7980101b353c16bf1aff155 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104689" comment="MozillaFirefox-translations less than 17.0.8esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104690" comment="MozillaFirefox less than 17.0.8esr-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1739</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1739" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1739" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 574e354cc19e6404e0964c3b1348f211 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104736" comment="mozilla-nspr-32bit less than 4.10.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104737" comment="mozilla-nspr-devel less than 4.10.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104738" comment="mozilla-nspr less than 4.10.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104739" comment="mozilla-nss-32bit less than 3.15.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104740" comment="mozilla-nss-devel less than 3.15.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104741" comment="mozilla-nss-tools less than 3.15.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104742" comment="mozilla-nss less than 3.15.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- f4dc527883357fa1c73dfcbfaa52ddfe -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104736" comment="mozilla-nspr-32bit less than 4.10.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104737" comment="mozilla-nspr-devel less than 4.10.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104738" comment="mozilla-nspr less than 4.10.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104739" comment="mozilla-nss-32bit less than 3.15.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104740" comment="mozilla-nss-devel less than 3.15.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104741" comment="mozilla-nss-tools less than 3.15.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104742" comment="mozilla-nss less than 3.15.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1741</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1741" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1741" source="CVE"/>
	<description>
	Integer overflow in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large size value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06e5fb9c1bb44bc958d26f52b71b7269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 3847822af2a8723bbe4fbc4f642205f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1775</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1775" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1775" source="CVE"/>
	<description>
	sudo 1.6.0 through 1.7.10p6 and sudo 1.8.0 through 1.8.6p6 allows local users or physically proximate attackers to bypass intended time restrictions and retain privileges without re-authenticating by setting the system clock and sudo user timestamp to the epoch.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15848b3b7ae158210dabd736b67fa800 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104750" comment="sudo less than 1.6.8p12-18.21.8"/>
	</criteria>
	<!-- 68356be24d3ee0305b115b7f77e08946 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077212" comment="sudo less than 1.6.9p23-0.18.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1776</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1776" source="CVE"/>
	<description>
	sudo 1.3.5 through 1.7.10 and 1.8.0 through 1.8.5, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15848b3b7ae158210dabd736b67fa800 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104750" comment="sudo less than 1.6.8p12-18.21.8"/>
	</criteria>
	<!-- 68356be24d3ee0305b115b7f77e08946 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077212" comment="sudo less than 1.6.9p23-0.18.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1788</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1788" source="CVE"/>
	<description>
	poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via vectors that trigger an "invalid memory access" in (1) splash/Splash.cc, (2) poppler/Function.cc, and (3) poppler/Stream.cc.
	</description>
 </metadata>
<!-- c6f02331d1ee67b8fc7c6997d72f8cf0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076955" comment="poppler-glib less than 0.4.4-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076956" comment="poppler-qt less than 0.4.4-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076957" comment="poppler less than 0.4.4-19.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076954" comment="poppler-devel less than 0.4.4-19.29.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1789</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1789" source="CVE"/>
	<description>
	splash/Splash.cc in poppler before 0.22.1 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to the (1) Splash::arbitraryTransformMask, (2) Splash::blitMask, and (3) Splash::scaleMaskYuXu functions.
	</description>
 </metadata>
<!-- c6f02331d1ee67b8fc7c6997d72f8cf0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076955" comment="poppler-glib less than 0.4.4-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076956" comment="poppler-qt less than 0.4.4-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076957" comment="poppler less than 0.4.4-19.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076954" comment="poppler-devel less than 0.4.4-19.29.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1790</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1790" source="CVE"/>
	<description>
	poppler/Stream.cc in poppler before 0.22.1 allows context-dependent attackers to have an unspecified impact via vectors that trigger a read of uninitialized memory by the CCITTFaxStream::lookChar function.
	</description>
 </metadata>
<!-- c6f02331d1ee67b8fc7c6997d72f8cf0 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009076955" comment="poppler-glib less than 0.4.4-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076956" comment="poppler-qt less than 0.4.4-19.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076957" comment="poppler less than 0.4.4-19.29.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009076954" comment="poppler-devel less than 0.4.4-19.29.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1821</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-1821" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1821" source="CVE"/>
	<description>
	lib/rexml/text.rb in the REXML parser in Ruby before 1.9.3-p392 allows remote attackers to cause a denial of service (memory consumption and crash) via crafted text nodes in an XML document, aka an XML Entity Expansion (XEE) attack.
	</description>
 </metadata>
<!-- 4c9e95f258c3139c5c70de419c8f734b -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009076979" comment="ruby-devel less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076980" comment="ruby-doc-html less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076981" comment="ruby-doc-ri less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076982" comment="ruby-examples less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076983" comment="ruby-test-suite less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076984" comment="ruby-tk less than 1.8.6.p369-0.14.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009076967" comment="ruby less than 1.8.6.p369-0.14.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1827</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1827" source="CVE"/>
	<description>
	net/dccp/ccid.h in the Linux kernel before 3.5.4 allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for a certain (1) sender or (2) receiver getsockopt call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1845</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-1845" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1845" source="CVE"/>
	<description>
	The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (memory consumption) by (1) setting or (2) deleting a large number of properties for a file or directory.
	</description>
 </metadata>
<!-- 21e270ec8a024f0ab0ccf967180f9802 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077291" comment="cvs2svn less than 1.3.0-30.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077278" comment="subversion-devel less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077292" comment="subversion-python less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077293" comment="subversion-server less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077294" comment="subversion-tools less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077279" comment="subversion less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077295" comment="viewcvs less than 1.0.5-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131846" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1846</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-1846" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1846" source="CVE"/>
	<description>
	The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x before 1.6.21 and 1.7.0 through 1.7.8 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a LOCK on an activity URL.
	</description>
 </metadata>
<!-- 21e270ec8a024f0ab0ccf967180f9802 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077291" comment="cvs2svn less than 1.3.0-30.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077278" comment="subversion-devel less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077292" comment="subversion-python less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077293" comment="subversion-server less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077294" comment="subversion-tools less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077279" comment="subversion less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077295" comment="viewcvs less than 1.0.5-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1849</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-1849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1849" source="CVE"/>
	<description>
	The mod_dav_svn Apache HTTPD server module in Subversion 1.6.x through 1.6.20 and 1.7.0 through 1.7.8 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a PROPFIND request for an activity URL.
	</description>
 </metadata>
<!-- 21e270ec8a024f0ab0ccf967180f9802 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077291" comment="cvs2svn less than 1.3.0-30.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077278" comment="subversion-devel less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077292" comment="subversion-python less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077293" comment="subversion-server less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077294" comment="subversion-tools less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077279" comment="subversion less than 1.3.1-1.22.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077295" comment="viewcvs less than 1.0.5-0.22.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1862</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1862" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1862" source="CVE"/>
	<description>
	mod_rewrite.c in the mod_rewrite module in the Apache HTTP Server 2.2.x before 2.2.25 writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to execute arbitrary commands via an HTTP request containing an escape sequence for a terminal emulator.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0593c1f59d8a810c00150b05cea3af2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104751" comment="apache2-devel less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104752" comment="apache2-doc less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104753" comment="apache2-example-pages less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104754" comment="apache2-prefork less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104755" comment="apache2-worker less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104756" comment="apache2 less than 2.2.3-16.32.51.2"/>
		</criteria>
	</criteria>
	<!-- 0ddc907bde6fcbad1e94944d867f60dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104757" comment="apache2-devel less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104758" comment="apache2-doc less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104759" comment="apache2-example-pages less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104760" comment="apache2-prefork less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104761" comment="apache2-worker less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104762" comment="apache2 less than 2.2.3-16.50.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131894" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1894</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1894" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1894" source="CVE"/>
	<description>
	** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2013-2561. Reason: This candidate is a duplicate of CVE-2013-2561. Notes: All CVE users should reference CVE-2013-2561 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8e5fb9360d3b7709308d0707088c7e0f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077625" comment="ibutils-32bit less than 1.5.4-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077626" comment="ibutils-64bit less than 1.5.4-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077627" comment="ibutils-devel-32bit less than 1.5.4-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077628" comment="ibutils-devel-64bit less than 1.5.4-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077629" comment="ibutils-devel less than 1.5.4-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077630" comment="ibutils-x86 less than 1.5.4-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077631" comment="ibutils less than 1.5.4-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1896</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1896" source="CVE"/>
	<description>
	mod_dav.c in the Apache HTTP Server before 2.2.25 does not properly determine whether DAV is enabled for a URI, which allows remote attackers to cause a denial of service (segmentation fault) via a MERGE request in which the URI is configured for handling by the mod_dav_svn module, but a certain href attribute in XML data refers to a non-DAV URI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0593c1f59d8a810c00150b05cea3af2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104751" comment="apache2-devel less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104752" comment="apache2-doc less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104753" comment="apache2-example-pages less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104754" comment="apache2-prefork less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104755" comment="apache2-worker less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104756" comment="apache2 less than 2.2.3-16.32.51.2"/>
		</criteria>
	</criteria>
	<!-- 0ddc907bde6fcbad1e94944d867f60dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104757" comment="apache2-devel less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104758" comment="apache2-doc less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104759" comment="apache2-example-pages less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104760" comment="apache2-prefork less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104761" comment="apache2-worker less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104762" comment="apache2 less than 2.2.3-16.50.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1914</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1914" source="CVE"/>
	<description>
	Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17c15337eaf4f28f28cdc9f9d3d731ec -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104319" comment="glibc-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104320" comment="glibc-devel-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104321" comment="glibc-devel less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104322" comment="glibc-html less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104323" comment="glibc-i18ndata less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104324" comment="glibc-info less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104325" comment="glibc-locale-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104326" comment="glibc-locale less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104327" comment="glibc-profile-32bit less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104328" comment="glibc-profile less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104329" comment="glibc less than 2.4-31.77.102.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104330" comment="nscd less than 2.4-31.77.102.1"/>
		</criteria>
	</criteria>
	<!-- 4ca050db7cee063070fd004b2b257e13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077370" comment="glibc-32bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077384" comment="glibc-64bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077371" comment="glibc-devel-32bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077385" comment="glibc-devel-64bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077372" comment="glibc-devel less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077373" comment="glibc-html less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077374" comment="glibc-i18ndata less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077375" comment="glibc-info less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077376" comment="glibc-locale-32bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077386" comment="glibc-locale-64bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077387" comment="glibc-locale-x86 less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077377" comment="glibc-locale less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077388" comment="glibc-profile-32bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077389" comment="glibc-profile-64bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077390" comment="glibc-profile-x86 less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077391" comment="glibc-profile less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077392" comment="glibc-x86 less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077378" comment="glibc less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077379" comment="nscd less than 2.4-31.109.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077393" comment="glibc-dceext-32bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077394" comment="glibc-dceext-64bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077395" comment="glibc-dceext-x86 less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077396" comment="glibc-dceext less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077373" comment="glibc-html less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077388" comment="glibc-profile-32bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077389" comment="glibc-profile-64bit less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077390" comment="glibc-profile-x86 less than 2.4-31.109.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077391" comment="glibc-profile less than 2.4-31.109.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1917</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917" source="CVE"/>
	<description>
	Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1920</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1920" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920" source="CVE"/>
	<description>
	Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1923</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1923" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1923" source="CVE"/>
	<description>
	rpc-gssd in nfs-utils before 1.2.8 performs reverse DNS resolution for server names during GSSAPI authentication, which might allow remote attackers to read otherwise-restricted files via DNS spoofing attacks.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- d09650071376a0484c040c98456e0ff5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104763" comment="nfs-utils less than 1.0.7-36.39.42.1"/>
	</criteria>
	<!-- ef37ac88c972140f7b0899d49079ba8c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077276" comment="nfs-utils less than 1.0.7-36.52.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1928</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-1928" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1928" source="CVE"/>
	<description>
	The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 42590e04eddb51fa31379710deb16611 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077357" comment="kernel-smp less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 4f3691ec5a62d5e0a58b289de36e7ba5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
		</criteria>
	</criteria>
	<!-- 60a0921c1bb3961c00333f60f45fee0b -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077361" comment="kernel-bigsmp less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077365" comment="kernel-kdumppae less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077357" comment="kernel-smp less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077366" comment="kernel-vmi less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077367" comment="kernel-vmipae less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077362" comment="kernel-xenpae less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077360" comment="kernel-xen less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077362" comment="kernel-xenpae less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria></criteria>
	<!-- 806641e6eb093ae891357f0c47c7e76f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077368" comment="kernel-iseries64 less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077369" comment="kernel-ppc64 less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077364" comment="kernel-kdump less than 2.6.16.60-0.103.1"/>
		</criteria></criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- b108e81194a14724506e0d40a5303d13 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077356" comment="kernel-default less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077358" comment="kernel-source less than 2.6.16.60-0.103.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077359" comment="kernel-syms less than 2.6.16.60-0.103.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077363" comment="kernel-debug less than 2.6.16.60-0.103.1"/>
		</criteria></criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1940</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1940" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1940" source="CVE"/>
	<description>
	X.Org X server before 1.13.4 and 1.4.x before 1.14.1 does not properly restrict access to input events when adding a new hot-plug device, which might allow physically proximate attackers to obtain sensitive information, as demonstrated by reading passwords from a tty.
	</description>
 </metadata>
<!-- 69cb26f8a0705fcf17f6341d54cdb9e1 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077380" comment="xorg-x11-server less than 6.9.0-50.82.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1944</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1944" source="CVE"/>
	<description>
	The tailMatch function in cookie.c in cURL and libcurl before 7.30.0 does not properly match the path domain when sending cookies, which allows remote attackers to steal cookies via a matching suffix in the domain of a URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2ccca265ff5a56f164062acebb540e5d -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077196" comment="curl-32bit less than 7.15.1-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077204" comment="curl-64bit less than 7.15.1-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077197" comment="curl-devel less than 7.15.1-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077205" comment="curl-x86 less than 7.15.1-19.26.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077198" comment="curl less than 7.15.1-19.26.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077197" comment="curl-devel less than 7.15.1-19.26.1"/>
		</criteria></criteria>
	<!-- 4dd1f084a8e5b92825d43c3c3d0a2326 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077199" comment="compat-curl2-32bit less than 7.11.0-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077206" comment="compat-curl2-64bit less than 7.11.0-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077207" comment="compat-curl2-x86 less than 7.11.0-20.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077200" comment="compat-curl2 less than 7.11.0-20.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1960</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1960" source="CVE"/>
	<description>
	Heap-based buffer overflow in the t2p_process_jpeg_strip function in tiff2pdf in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted TIFF image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2281c07d506043b014b0b2aa06f2d47f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077213" comment="libtiff-32bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077219" comment="libtiff-64bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077220" comment="libtiff-devel-32bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077221" comment="libtiff-devel-64bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077214" comment="libtiff-devel less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077222" comment="libtiff-x86 less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077215" comment="libtiff less than 3.8.2-5.34.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077220" comment="libtiff-devel-32bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077221" comment="libtiff-devel-64bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077214" comment="libtiff-devel less than 3.8.2-5.34.1"/>
			</criteria>
		</criteria></criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1961</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1961" source="CVE"/>
	<description>
	Stack-based buffer overflow in the t2p_write_pdf_page function in tiff2pdf in libtiff before 4.0.3 allows remote attackers to cause a denial of service (application crash) via a crafted image length and resolution in a TIFF image file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2281c07d506043b014b0b2aa06f2d47f -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077213" comment="libtiff-32bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077219" comment="libtiff-64bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077220" comment="libtiff-devel-32bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077221" comment="libtiff-devel-64bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077214" comment="libtiff-devel less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077222" comment="libtiff-x86 less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077215" comment="libtiff less than 3.8.2-5.34.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077220" comment="libtiff-devel-32bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077221" comment="libtiff-devel-64bit less than 3.8.2-5.34.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077214" comment="libtiff-devel less than 3.8.2-5.34.1"/>
			</criteria>
		</criteria></criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1968</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-1968" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1968" source="CVE"/>
	<description>
	Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote authenticated users to cause a denial of service (FSFS repository corruption) via a newline character in a file name.
	</description>
 </metadata>
<!-- 64648aca6f33898d15cd8c0c4956232f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077652" comment="cvs2svn less than 1.3.0-30.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077646" comment="subversion-devel less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077653" comment="subversion-python less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077654" comment="subversion-server less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077655" comment="subversion-tools less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077647" comment="subversion less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077656" comment="viewcvs less than 1.0.5-0.24.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1981</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1981" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XQueryFont, (2) _XF86BigfontQueryFont, (3) XListFontsWithInfo, (4) XGetMotionEvents, (5) XListHosts, (6) XGetModifierMapping, (7) XGetPointerMapping, (8) XGetKeyboardMapping, (9) XGetWindowProperty, (10) XGetImage, (11) LoadColornameDB, (12) XrmGetFileDatabase, (13) _XimParseStringFile, or (14) TransFileName functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1982</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1982" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1982" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXext 1.3.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XcupGetReservedColormapEntries, (2) XcupStoreColors, (3) XdbeGetVisualInfo, (4) XeviGetVisualInfo, (5) XShapeGetRectangles, and (6) XSyncListSystemCounters functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1983</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1983" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1983" source="CVE"/>
	<description>
	Integer overflow in X.org libXfixes 5.0 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XFixesGetCursorImage function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1984</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1984" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1984" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1985</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1985" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1985" source="CVE"/>
	<description>
	Integer overflow in X.org libXinerama 1.1.2 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XineramaQueryScreens function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1987</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1987" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1987" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXrender 0.9.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XRenderQueryFilters, (2) XRenderQueryFormats, and (3) XRenderQueryPictIndexValues functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1988</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1988" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1988" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXRes 1.0.6 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XResQueryClients and (2) XResQueryClientResources functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1989</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1989" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1989" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXv 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvQueryPortAttributes, (2) XvListImageFormats, and (3) XvCreateImage function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1990</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1990" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1990" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXvMC 1.0.7 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XvMCListSurfaceTypes and (2) XvMCListSubpictureTypes functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1991</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1991" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1991" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XDGAQueryModes and (2) XDGASetMode functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1992</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1992" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1992" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libdmx 1.1.2 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) DMXGetScreenAttributes, (2) DMXGetWindowAttributes, and (3) DMXGetInputAttributes functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1993</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1993" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1993" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection and (2) XF86DRIGetClientDriverName functions.
	</description>
 </metadata>
<!-- ead44002505a3c1d8f81d2f879ef6d0c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077599" comment="Mesa-32bit less than 6.4.2-19.20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077608" comment="Mesa-64bit less than 6.4.2-19.20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077600" comment="Mesa-devel-32bit less than 6.4.2-19.20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077609" comment="Mesa-devel-64bit less than 6.4.2-19.20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077601" comment="Mesa-devel less than 6.4.2-19.20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077610" comment="Mesa-x86 less than 6.4.2-19.20.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077602" comment="Mesa less than 6.4.2-19.20.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1995</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1995" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1995" source="CVE"/>
	<description>
	X.org libXi 1.7.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the XListInputDevices function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1996</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1996" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1996" source="CVE"/>
	<description>
	X.org libFS 1.0.4 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to an unexpected sign extension in the FSOpenServer function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1997</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1997" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1997" source="CVE"/>
	<description>
	Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1998</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1998" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1998" source="CVE"/>
	<description>
	Multiple buffer overflows in X.org libXi 1.7.1 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XGetDeviceButtonMapping, (2) XIPassiveGrabDevice, and (3) XQueryDeviceState functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20131999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-1999</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-1999" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1999" source="CVE"/>
	<description>
	Buffer overflow in X.org libXvMC 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvMCGetDRInfo function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2000</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2000" source="CVE"/>
	<description>
	Multiple buffer overflows in X.org libXxf86dga 1.1.3 and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XDGAQueryModes and (2) XDGASetMode functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2001</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2001" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2001" source="CVE"/>
	<description>
	Buffer overflow in X.org libXxf86vm 1.1.2 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XF86VidModeGetGammaRamp function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2002</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2002" source="CVE"/>
	<description>
	Buffer overflow in X.org libXt 1.1.3 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the _XtResourceConfigurationEH function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2003</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2003" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2003" source="CVE"/>
	<description>
	Integer overflow in X.org libXcursor 1.1.13 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the _XcursorFileHeaderCreate function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2004</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2004" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2004" source="CVE"/>
	<description>
	The (1) GetDatabase and (2) _XimParseStringFile functions in X.org libX11 1.5.99.901 (1.6 RC1) and earlier do not restrict the recursion depth when processing directives to include files, which allows X servers to cause a denial of service (stack consumption) via a crafted file.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2005</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2005" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2005" source="CVE"/>
	<description>
	X.org libXt 1.1.3 and earlier does not check the return value of the XGetWindowProperty function, which allows X servers to trigger use of an uninitialized pointer and memory corruption via vectors related to the (1) ReqCleanup, (2) HandleSelectionEvents, (3) ReqTimedOut, (4) HandleNormal, and (5) HandleSelectionReplies functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2020</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2020" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2020" source="CVE"/>
	<description>
	Integer underflow in the cli_scanpe function in pe.c in ClamAV before 0.97.8 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 9d302ad645143524072bb084bf9f2ded -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077457" comment="clamav less than 0.97.8-0.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2021</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2021" source="CVE"/>
	<description>
	pdf.c in ClamAV 0.97.1 through 0.97.7 allows remote attackers to cause a denial of service (out-of-bounds-read) via a crafted length value in an encrypted PDF file.
	</description>
 </metadata>
<!-- 9d302ad645143524072bb084bf9f2ded -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077457" comment="clamav less than 0.97.8-0.5.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2053</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2053" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2053" source="CVE"/>
	<description>
	Buffer overflow in the atodn function in Openswan before 2.6.39, when Opportunistic Encryption is enabled and an RSA key is being used, allows remote attackers to cause a denial of service (pluto IKE daemon crash) and possibly execute arbitrary code via crafted DNS TXT records.  NOTE: this might be the same vulnerability as CVE-2013-2052 and CVE-2013-2054.
	</description>
 </metadata>
<!-- 4e623ae4a993ce51b1b6b7d9b96ebcb5 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077539" comment="openswan less than 2.4.4-18.21.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2062</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2062" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2062" source="CVE"/>
	<description>
	Multiple integer overflows in X.org libXp 1.0.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XpGetAttributes, (2) XpGetOneAttribute, (3) XpGetPrinterList, and (4) XpQueryScreens functions.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2063</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2063" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2063" source="CVE"/>
	<description>
	Integer overflow in X.org libXtst 1.2.1 and earlier allows X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the XRecordGetContext function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2066</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2066" source="CVE"/>
	<description>
	Buffer overflow in X.org libXv 1.0.7 and earlier allows X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the XvQueryPortAttributes function.
	</description>
 </metadata>
<!-- 0d0adbe855f0a576da72ba4a295c3364 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077583" comment="xorg-x11-Xnest less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077585" comment="xorg-x11-Xvnc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077586" comment="xorg-x11-devel-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077603" comment="xorg-x11-devel-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077587" comment="xorg-x11-devel less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077588" comment="xorg-x11-fonts-100dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077589" comment="xorg-x11-fonts-75dpi less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077590" comment="xorg-x11-fonts-cyrillic less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077591" comment="xorg-x11-fonts-scalable less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077592" comment="xorg-x11-fonts-syriac less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077593" comment="xorg-x11-libs-32bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077605" comment="xorg-x11-libs-64bit less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077606" comment="xorg-x11-libs-x86 less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077594" comment="xorg-x11-libs less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077595" comment="xorg-x11-man less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077596" comment="xorg-x11-server-glx less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077597" comment="xorg-x11-server less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077598" comment="xorg-x11 less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077584" comment="xorg-x11-Xvfb less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077604" comment="xorg-x11-doc less than 6.9.0-50.84.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077607" comment="xorg-x11-sdk less than 6.9.0-50.84.4"/>
		</criteria>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2112</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-2112" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2112" source="CVE"/>
	<description>
	The svnserve server in Subversion before 1.6.23 and 1.7.x before 1.7.10 allows remote attackers to cause a denial of service (exit) by aborting a connection.
	</description>
 </metadata>
<!-- 64648aca6f33898d15cd8c0c4956232f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077652" comment="cvs2svn less than 1.3.0-30.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077646" comment="subversion-devel less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077653" comment="subversion-python less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077654" comment="subversion-server less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077655" comment="subversion-tools less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077647" comment="subversion less than 1.3.1-1.24.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077656" comment="viewcvs less than 1.0.5-0.24.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2116</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2116" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2116" source="CVE"/>
	<description>
	The _gnutls_ciphertext2compressed function in lib/gnutls_cipher.c in GnuTLS 2.12.23 allows remote attackers to cause a denial of service (buffer over-read and crash) via a crafted padding length.  NOTE: this might be due to an incorrect fix for CVE-2013-0169.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- c39cabef26db30df30eff8a1bbef4088 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077458" comment="gnutls-32bit less than 1.2.10-13.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077468" comment="gnutls-64bit less than 1.2.10-13.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077459" comment="gnutls-devel-32bit less than 1.2.10-13.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077469" comment="gnutls-devel-64bit less than 1.2.10-13.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077460" comment="gnutls-devel less than 1.2.10-13.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077470" comment="gnutls-x86 less than 1.2.10-13.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077461" comment="gnutls less than 1.2.10-13.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2141</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2141" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2141" source="CVE"/>
	<description>
	The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2147</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2147" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2147" source="CVE"/>
	<description>
	The HP Smart Array controller disk-array driver and Compaq SMART2 controller disk-array driver in the Linux kernel through 3.9.4 do not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via (1) a crafted IDAGETPCIINFO command for a /dev/ida device, related to the ida_locked_ioctl function in drivers/block/cpqarray.c or (2) a crafted CCISS_PASSTHRU32 command for a /dev/cciss device, related to the cciss_ioctl32_passthru function in drivers/block/cciss.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2164</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2164" source="CVE"/>
	<description>
	The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2174</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2174" source="CVE"/>
	<description>
	Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 08501b52d2872aa5cb15654bf0e2cc4b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077558" comment="compat-curl2-32bit less than 7.11.0-20.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077566" comment="compat-curl2-64bit less than 7.11.0-20.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077567" comment="compat-curl2-x86 less than 7.11.0-20.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077559" comment="compat-curl2 less than 7.11.0-20.11.1"/>
		</criteria>
	</criteria>
	<!-- 36472a9fc55e64701eef885c5ac34ebd -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077572" comment="curl-32bit less than 7.15.1-19.30.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077578" comment="curl-64bit less than 7.15.1-19.30.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077573" comment="curl-devel less than 7.15.1-19.30.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077579" comment="curl-x86 less than 7.15.1-19.30.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077574" comment="curl less than 7.15.1-19.30.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077573" comment="curl-devel less than 7.15.1-19.30.1"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2194</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194" source="CVE"/>
	<description>
	Multiple integer overflows in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2195</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195" source="CVE"/>
	<description>
	The Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "pointer dereferences" involving unexpected calculations.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "other problems" that are not CVE-2013-2194 or CVE-2013-2195.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2206</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2206" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2206" source="CVE"/>
	<description>
	The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2232</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2232" source="CVE"/>
	<description>
	The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2234</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2234" source="CVE"/>
	<description>
	The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2236</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2236" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2236" source="CVE"/>
	<description>
	Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6cc544cafa35bad90a6c69b6b80644c6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104655" comment="quagga-devel less than 0.99.9-14.17.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104656" comment="quagga less than 0.99.9-14.17.12"/>
		</criteria>
	</criteria>
	<!-- 718958de9702ca0d22de230f19958498 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104655" comment="quagga-devel less than 0.99.9-14.17.12"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104656" comment="quagga less than 0.99.9-14.17.12"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2237</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2237" source="CVE"/>
	<description>
	The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2383</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2383" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2384, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "handling of [a] glyph table" in the International Components for Unicode (ICU) Layout Engine before 51.2.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2384</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2384" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2384" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-1569, CVE-2013-2383, and CVE-2013-2420. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font layout" in the International Components for Unicode (ICU) Layout Engine before 51.2.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2394</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2394" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2394" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2432 and CVE-2013-1491.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132407" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2407</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2407" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2407" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "XML security and the class loader."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2412</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2412" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serviceability.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient indication of an SSL connection failure by JConsole, related to RMI connection dialog box.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2417</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2417" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to Networking.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to an information leak involving InetAddress serialization. CVE has not investigated the apparent discrepancy between vendor reports regarding the impact of this issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2418</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2418" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2418" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2419</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2419" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2419" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "font processing errors" in the International Components for Unicode (ICU) Layout Engine before 51.2.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2420" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to insufficient "validation of images" in share/native/sun/awt/image/awt_ImageRep.c, possibly involving offsets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2422</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2422" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper method-invocation restrictions by the MethodUtil trampoline class, which allows remote attackers to bypass the Java sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2424</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2424" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality via vectors related to JMX. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "insufficient class access checks" when "creating new instances" using MBeanInstantiator.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2429</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2429" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; and OpenJDK 6 and 7; allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO.  NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageWriter state corruption" when using native code, which triggers memory corruption.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2430</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2430" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2430" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, and 5.0 Update 41 and earlier; JavaFX 2.2.7 and earlier; and OpenJDK 6 and 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to ImageIO. NOTE: the previous information is from the April 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "JPEGImageReader state corruption" when using native code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2432</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2432" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2432" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier, 6 Update 43 and earlier, 5.0 Update 41 and earlier, and JavaFX 2.2.7 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2394 and CVE-2013-1491.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- 8498417876678ff676fabbcad8fe7baa -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077410" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077411" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077412" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.17-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077413" comment="java-1_4_2-ibm less than 1.4.2_sr13.17-0.5.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2433</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2433" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2433" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-1540.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2435</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2435" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2435" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2440.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2437</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2437" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2437" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2440</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2440" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2440" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 17 and earlier and 6 Update 43 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2435.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 123f16c9260c506ce9b1083723f61ff8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077280" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077281" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077282" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077283" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077284" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077285" comment="java-1_6_0-ibm-devel less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077286" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077287" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077288" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077289" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr13.2-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077290" comment="java-1_6_0-ibm less than 1.6.0_sr13.2-0.8.1"/>
		</criteria>
	</criteria>
	<!-- a36ba08c692a30308a29e6242e31eea2 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077398" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077409" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077399" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077400" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077402" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077403" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077404" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077405" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077406" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077408" comment="java-1_5_0-ibm less than 1.5.0_sr16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2442</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2442" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2442" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2466 and CVE-2013-2468.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2443</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2443" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2452 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect "checking order" within the AccessControlContext class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2444</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2444" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier; JavaFX 2.2.21 and earlier; and OpenJDK 7 allows remote attackers to affect availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not "properly manage and restrict certain resources related to the processing of fonts," possibly involving temporary files.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2446</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2446" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via vectors related to CORBA. NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly enforce access restrictions for CORBA output streams.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2447</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2447" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2447" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to obtain a socket's local address via vectors involving inconsistencies between Socket.getLocalAddress and InetAddress.getLocalHost.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2448</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2448" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to insufficient "access restrictions" and "robustness of sound classes."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2450</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2450" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2450" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect availability via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper handling of circular references in ObjectStreamClass.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2451</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2451" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier, and OpenJDK 7, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Networking.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper enforcement of exclusive port binds when running on Windows, which allows attackers to bind to ports that are already in use.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2452</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2452" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2455.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to "network address handling in virtual machine identifiers" and the lack of "unique and unpredictable IDs" in the java.rmi.dgc.VMID class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2453</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2453" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to a missing check for "package access" by the MBeanServer Introspector.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2454</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2454" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2454" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality and integrity via vectors related to JDBC.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue does not properly restrict access to certain class packages in the SerialJavaObject class, which allows remote attackers to bypass the Java sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2455</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2455" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2455" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Libraries, a different vulnerability than CVE-2013-2443 and CVE-2013-2452.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to incorrect access checks by the (1) getEnclosingClass, (2) getEnclosingMethod, and (3) getEnclosingConstructor methods.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2456</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2456" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality via unknown vectors related to Serialization.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to improper access checks for subclasses in the ObjectOutputStream class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2457</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2457" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect integrity via vectors related to JMX.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue is due to an incorrect implementation of "certain class checks" that allows remote attackers to bypass intended class restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2459</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2459" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "integer overflow checks."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2463</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2463" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image attribute verification" in 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2464</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2464" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2464" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-2463, CVE-2013-2465, CVE-2013-2469, CVE-2013-2470, CVE-2013-2471, CVE-2013-2472, and CVE-2013-2473.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2465</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2465" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2465" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image channel verification" in 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2466</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2466" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2468.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2468</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2468" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-2442 and CVE-2013-2466.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2469</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2469" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect image layout verification" in 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2470</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2470" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "ImagingLib byte lookup processing."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2471</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2471" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect IntegerComponentRaster size checks."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2472</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2472" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ShortBandedRaster size checks" in 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2473</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2473" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier, 6 Update 45 and earlier, and 5.0 Update 45 and earlier, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the June 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass the Java sandbox via vectors related to "Incorrect ByteBandedRaster size checks" in 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2475</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2475" source="CVE"/>
	<description>
	The TCP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2476</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2476" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2476" source="CVE"/>
	<description>
	The dissect_hartip function in epan/dissectors/packet-hartip.c in the HART/IP dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a packet with a header that is too short.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2477</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2477" source="CVE"/>
	<description>
	The CSN.1 dissector in Wireshark 1.8.x before 1.8.6 does not properly manage function pointers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2478</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2478" source="CVE"/>
	<description>
	The dissect_server_info function in epan/dissectors/packet-ms-mms.c in the MS-MMS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not properly manage string lengths, which allows remote attackers to cause a denial of service (application crash) via a malformed packet that (1) triggers an integer overflow or (2) has embedded '\0' characters in a string.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2479</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2479" source="CVE"/>
	<description>
	The dissect_mpls_echo_tlv_dd_map function in epan/dissectors/packet-mpls-echo.c in the MPLS Echo dissector in Wireshark 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via invalid Sub-tlv data.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2480</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2480" source="CVE"/>
	<description>
	The RTPS and RTPS2 dissectors in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2481</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2481" source="CVE"/>
	<description>
	Integer signedness error in the dissect_mount_dirpath_call function in epan/dissectors/packet-mount.c in the Mount dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6, when nfs_file_name_snooping is enabled, allows remote attackers to cause a denial of service (application crash) via a negative length value.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2482</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2482" source="CVE"/>
	<description>
	The AMPQ dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2483</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2483" source="CVE"/>
	<description>
	The acn_add_dmp_data function in epan/dissectors/packet-acn.c in the ACN dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via an invalid count value in ACN_DMP_ADT_D_RE DMP data.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2484</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2484" source="CVE"/>
	<description>
	The CIMD dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2485</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2485" source="CVE"/>
	<description>
	The FCSP dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 allows remote attackers to cause a denial of service (infinite loop) via a malformed packet.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2486</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2486" source="CVE"/>
	<description>
	The dissect_diagnosticrequest function in epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
		</criteria></criteria>
	<!-- cb4504a53f9b3d0625f514d688e2c947 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2487</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2487" source="CVE"/>
	<description>
	epan/dissectors/packet-reload.c in the REsource LOcation And Discovery (aka RELOAD) dissector in Wireshark 1.8.x before 1.8.6 uses incorrect integer data types, which allows remote attackers to cause a denial of service (infinite loop) via crafted integer values in a packet, related to the (1) dissect_icecandidates, (2) dissect_kinddata, (3) dissect_nodeid_list, (4) dissect_storeans, (5) dissect_storereq, (6) dissect_storeddataspecifier, (7) dissect_fetchreq, (8) dissect_findans, (9) dissect_diagnosticinfo, (10) dissect_diagnosticresponse, (11) dissect_reload_messagecontents, and (12) dissect_reload_message functions, a different vulnerability than CVE-2013-2486.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
		</criteria></criteria>
	<!-- cb4504a53f9b3d0625f514d688e2c947 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2488</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2488" source="CVE"/>
	<description>
	The DTLS dissector in Wireshark 1.6.x before 1.6.14 and 1.8.x before 1.8.6 does not validate the fragment offset before invoking the reassembly state machine, which allows remote attackers to cause a denial of service (application crash) via a large offset value that triggers write access to an invalid memory location.
	</description>
 </metadata>
<!-- 3db4a4d24062a3721e7cba8ec8f8d3a4 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077106" comment="wireshark less than 1.6.14-0.5.1"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077109" comment="wireshark-devel less than 1.6.14-0.5.1"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2776</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2776" source="CVE"/>
	<description>
	sudo 1.3.5 through 1.7.10p5 and 1.8.0 through 1.8.6p6, when running on systems without /proc or the sysctl function with the tty_tickets option enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15848b3b7ae158210dabd736b67fa800 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104750" comment="sudo less than 1.6.8p12-18.21.8"/>
	</criteria>
	<!-- 68356be24d3ee0305b115b7f77e08946 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077212" comment="sudo less than 1.6.9p23-0.18.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2777</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2777" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2777" source="CVE"/>
	<description>
	sudo before 1.7.10p5 and 1.8.x before 1.8.6p6, when the tty_tickets option is enabled, does not properly validate the controlling terminal device, which allows local users with sudo permissions to hijack the authorization of another terminal via vectors related to a session without a controlling terminal device and connecting to the standard input, output, and error file descriptors of another terminal.  NOTE: this is one of three closely-related vulnerabilities that were originally assigned CVE-2013-1776, but they have been SPLIT because of different affected versions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15848b3b7ae158210dabd736b67fa800 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104750" comment="sudo less than 1.6.8p12-18.21.8"/>
	</criteria>
	<!-- 68356be24d3ee0305b115b7f77e08946 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077212" comment="sudo less than 1.6.9p23-0.18.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2877</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877" source="CVE"/>
	<description>
	parser.c in libxml2 before 2.9.0, as used in Google Chrome before 28.0.1500.71 and other products, allows remote attackers to cause a denial of service (out-of-bounds read) via a document that ends abruptly, related to the lack of certain checks for the XML_PARSER_EOF state.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- a3fdb1e2e30b1877238605841d41d573 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
	<!-- aeb05c467f847178dc94b70e3bc77cc8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104420" comment="libxml2-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104421" comment="libxml2-devel-32bit less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104422" comment="libxml2-devel less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104423" comment="libxml2-python less than 2.6.23-15.39.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104424" comment="libxml2 less than 2.6.23-15.39.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2888</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2888" source="CVE"/>
	<description>
	Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2893</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2893" source="CVE"/>
	<description>
	The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2897</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-2897" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2897" source="CVE"/>
	<description>
	Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20132944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-2944</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-2944" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2944" source="CVE"/>
	<description>
	strongSwan 4.3.5 through 5.0.3, when using the OpenSSL plugin for ECDSA signature verification, allows remote attackers to authenticate as other users via an invalid signature.
	</description>
 </metadata>
<!-- 2390874895a97b266f9742fe8b0b4570 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077672" comment="strongswan-doc less than 4.4.0-6.13.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077673" comment="strongswan less than 4.4.0-6.13.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3009</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3009" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3009" source="CVE"/>
	<description>
	The com.ibm.CORBA.iiop.ClientDelegate class in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 improperly exposes the invoke method of the java.lang.reflect.Method class, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to the AccessController doPrivileged block.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
		</criteria>
	</criteria>
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3011</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3011" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3011" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3012.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3012</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3012" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3012" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 1.4.2 before 1.4.2 SR13-FP18, 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect confidentiality, availability, and integrity via unknown vectors, a different vulnerability than CVE-2013-3009 and CVE-2013-3011.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 218af645ef5f0082097200b5e9788a5a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 399735ab8d205f1101d90585a46d9b56 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077711" comment="java-1_4_2-ibm-devel less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077712" comment="java-1_4_2-ibm-jdbc less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077713" comment="java-1_4_2-ibm-plugin less than 1.4.2_sr13.18-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077714" comment="java-1_4_2-ibm less than 1.4.2_sr13.18-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3222</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3222" source="CVE"/>
	<description>
	The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3223</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3223" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3223" source="CVE"/>
	<description>
	The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3224</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3224" source="CVE"/>
	<description>
	The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3228</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3228" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3228" source="CVE"/>
	<description>
	The irda_recvmsg_dgram function in net/irda/af_irda.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3229</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3229" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3229" source="CVE"/>
	<description>
	The iucv_sock_recvmsg function in net/iucv/af_iucv.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3231</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3231" source="CVE"/>
	<description>
	The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3232</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3232" source="CVE"/>
	<description>
	The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3234</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3234" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3234" source="CVE"/>
	<description>
	The rose_recvmsg function in net/rose/af_rose.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3235</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3235" source="CVE"/>
	<description>
	net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2edd49abdf9ae71916d1b5acb9177a75 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- ab3d3594ee8b8099b9bc0f2a2095b6b6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- ffdbcc106c0e9486ae78943c42345dbd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104314" comment="kernel-bigsmp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104310" comment="kernel-debug less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104307" comment="kernel-default less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104311" comment="kernel-kdump less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104315" comment="kernel-kdumppae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104312" comment="kernel-smp less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104308" comment="kernel-source less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104309" comment="kernel-syms less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104316" comment="kernel-vmi less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104317" comment="kernel-vmipae less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104313" comment="kernel-xen less than 2.6.16.60-0.113.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104318" comment="kernel-xenpae less than 2.6.16.60-0.113.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3495</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-3495" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3495" source="CVE"/>
	<description>
	The Intel VT-d Interrupt Remapping engine in Xen 3.3.x through 4.3.x allows local guests to cause a denial of service (kernel panic) via a malformed Message Signaled Interrupt (MSI) from a PCI device that is bus mastering capable that triggers a System Error Reporting (SERR) Non-Maskable Interrupt (NMI).
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3555</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3555" source="CVE"/>
	<description>
	epan/dissectors/packet-gtpv2.c in the GTPv2 dissector in Wireshark 1.8.x before 1.8.7 calls incorrect functions in certain contexts related to ciphers, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3556</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3556" source="CVE"/>
	<description>
	The fragment_add_seq_common function in epan/reassemble.c in the ASN.1 BER dissector in Wireshark before r48943 has an incorrect pointer dereference during a comparison, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3557</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3557" source="CVE"/>
	<description>
	The dissect_ber_choice function in epan/dissectors/packet-ber.c in the ASN.1 BER dissector in Wireshark 1.6.x before 1.6.15 and 1.8.x before 1.8.7 does not properly initialize a certain variable, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3558</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3558" source="CVE"/>
	<description>
	The dissect_ccp_bsdcomp_opt function in epan/dissectors/packet-ppp.c in the PPP CCP dissector in Wireshark 1.8.x before 1.8.7 does not terminate a bit-field list, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3559</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3559" source="CVE"/>
	<description>
	epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.8.x before 1.8.7 uses incorrect integer data types, which allows remote attackers to cause a denial of service (integer overflow, and heap memory corruption or NULL pointer dereference, and application crash) via a malformed packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3560</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3560" source="CVE"/>
	<description>
	The dissect_dsmcc_un_download function in epan/dissectors/packet-mpeg-dsmcc.c in the MPEG DSM-CC dissector in Wireshark 1.8.x before 1.8.7 uses an incorrect format string, which allows remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3561</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3561" source="CVE"/>
	<description>
	Multiple integer overflows in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (loop or application crash) via a malformed packet, related to a crash of the Websocket dissector, an infinite loop in the MySQL dissector, and a large loop in the ETCH dissector.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3562</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3562" source="CVE"/>
	<description>
	Multiple integer signedness errors in the tvb_unmasked function in epan/dissectors/packet-websocket.c in the Websocket dissector in Wireshark 1.8.x before 1.8.7 allow remote attackers to cause a denial of service (application crash) via a malformed packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3743</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3743" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 6 Update 45 and earlier and 5.0 Update 45 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20133829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-3829</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-3829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-3829" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java SE, Java SE Embedded component in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4002</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Java 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Java 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4002" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 allows remote attackers to affect availability via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4829d9187c70595f2f4afabf4dcf6504 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 4ed92cf0de9b3b679aefd2605f9c3f66 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077699" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077715" comment="java-1_5_0-ibm-64bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077700" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077701" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077703" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077704" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077705" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077706" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077707" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077709" comment="java-1_5_0-ibm less than 1.5.0_sr16.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 83286d2f8367035fc1294114aff55891 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.6.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104678" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.6.6.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
	<!-- d4115b4339a15f88677fc83a534c4dc3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077677" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077678" comment="java-1_6_0-ibm-64bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077679" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077680" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077681" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077682" comment="java-1_6_0-ibm-devel less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077683" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077684" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077685" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077686" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr14.0-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077687" comment="java-1_6_0-ibm less than 1.6.0_sr14.0-0.11.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4041</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4041" source="CVE"/>
	<description>
	Unspecified vulnerability in IBM Java SDK 5.0.0 before SR16 FP4, 7.0.0 before SR6, 6.0.1 before SR7, and 6.0.0 before SR15 allows remote attackers to access restricted classes via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4073</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-4073" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4073" source="CVE"/>
	<description>
	The OpenSSL::SSL.verify_certificate_identity function in lib/openssl/ssl.rb in Ruby 1.8 before 1.8.7-p374, 1.9 before 1.9.3-p448, and 2.0 before 2.0.0-p247 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
<!-- 5ac82f78b15c4acb20e9a4af1b508de8 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009077734" comment="ruby-devel less than 1.8.6.p369-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077735" comment="ruby-doc-html less than 1.8.6.p369-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077736" comment="ruby-doc-ri less than 1.8.6.p369-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077737" comment="ruby-examples less than 1.8.6.p369-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077738" comment="ruby-test-suite less than 1.8.6.p369-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077739" comment="ruby-tk less than 1.8.6.p369-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009077721" comment="ruby less than 1.8.6.p369-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4074</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4074" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4074" source="CVE"/>
	<description>
	The dissect_capwap_data function in epan/dissectors/packet-capwap.c in the CAPWAP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 incorrectly uses a -1 data value to represent an error condition, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4075</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4075" source="CVE"/>
	<description>
	epan/dissectors/packet-gmr1_bcch.c in the GMR-1 BCCH dissector in Wireshark 1.8.x before 1.8.8 does not properly initialize memory, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4076</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4076" source="CVE"/>
	<description>
	Buffer overflow in the dissect_iphc_crtp_fh function in epan/dissectors/packet-ppp.c in the PPP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4077</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4077" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4077" source="CVE"/>
	<description>
	Array index error in the NBAP dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (application crash) via a crafted packet, related to nbap.cnf and packet-nbap.c.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4078</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4078" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4078" source="CVE"/>
	<description>
	epan/dissectors/packet-rdp.c in the RDP dissector in Wireshark 1.8.x before 1.8.8 does not validate return values during checks for data availability, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4079</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4079" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4079" source="CVE"/>
	<description>
	The dissect_schedule_message function in epan/dissectors/packet-gsm_cbch.c in the GSM CBCH dissector in Wireshark 1.8.x before 1.8.8 allows remote attackers to cause a denial of service (infinite loop and application hang) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4080</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4080" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4080" source="CVE"/>
	<description>
	The dissect_r3_upstreamcommand_queryconfig function in epan/dissectors/packet-assa_r3.c in the Assa Abloy R3 dissector in Wireshark 1.8.x before 1.8.8 does not properly handle a zero-length item, which allows remote attackers to cause a denial of service (infinite loop, and CPU and memory consumption) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4081</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4081" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4081" source="CVE"/>
	<description>
	The http_payload_subdissector function in epan/dissectors/packet-http.c in the HTTP dissector in Wireshark 1.6.x before 1.6.16 and 1.8.x before 1.8.8 does not properly determine when to use a recursive approach, which allows remote attackers to cause a denial of service (stack consumption) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4082</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4082" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4082" source="CVE"/>
	<description>
	The vwr_read function in wiretap/vwr.c in the Ixia IxVeriWave file parser in Wireshark 1.8.x before 1.8.8 does not validate the relationship between a record length and a trailer length, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4083</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4083" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4083" source="CVE"/>
	<description>
	The dissect_pft function in epan/dissectors/packet-dcp-etsi.c in the DCP ETSI dissector in Wireshark 1.6.x before 1.6.16, 1.8.x before 1.8.8, and 1.10.0 does not validate a certain fragment length value, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
	</description>
 </metadata>
<!-- cb4504a53f9b3d0625f514d688e2c947 -->
<criteria operator="OR">
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077758" comment="wireshark less than 1.6.16-0.5.5"/>
		</criteria>
	</criteria>
		<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077760" comment="wireshark-devel less than 1.6.16-0.5.5"/>
	</criteria></criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4113</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4113" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4113" source="CVE"/>
	<description>
	ext/xml/xml.c in PHP before 5.3.27 does not properly consider parsing depth, which allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted document that is processed by the xml_parse_into_struct function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 512092ac1a057c2d35c038267a87ab52 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077816" comment="php5-tidy less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4162</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4162" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4162" source="CVE"/>
	<description>
	The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4231</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4231" source="CVE"/>
	<description>
	Multiple buffer overflows in libtiff before 4.0.3 allow remote attackers to cause a denial of service (out-of-bounds write) via a crafted (1) extension block in a GIF image or (2) GIF raster image to tools/gif2tiff.c or (3) a long filename for a TIFF image to tools/rgb2ycbcr.c.  NOTE: vectors 1 and 3 are disputed by Red Hat, which states that the input cannot exceed the allocated buffer size.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f07933002ee5f5488648cf27c5bb141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4232</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4232" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4232" source="CVE"/>
	<description>
	Use-after-free vulnerability in the t2p_readwrite_pdf_image function in tools/tiff2pdf.c in libtiff 4.0.3 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted TIFF image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f07933002ee5f5488648cf27c5bb141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4237</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4237" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4237" source="CVE"/>
	<description>
	sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 190862be14e3ed91b361e0b0a66e292a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
		</criteria>
	</criteria>
	<!-- 767429925ce018c15cbe14c33d6a0f11 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104592" comment="glibc-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104593" comment="glibc-devel-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104594" comment="glibc-devel less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104595" comment="glibc-html less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104596" comment="glibc-i18ndata less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104597" comment="glibc-info less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104598" comment="glibc-locale-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104599" comment="glibc-locale less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104600" comment="glibc-profile-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104601" comment="glibc-profile less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104602" comment="glibc less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104603" comment="nscd less than 2.4-31.111.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4242</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4242" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4242" source="CVE"/>
	<description>
	GnuPG before 1.4.14, and Libgcrypt before 1.5.3 as used in GnuPG 2.0.x and possibly other products, allows local users to obtain private RSA keys via a cache side-channel attack involving the L3 cache, aka Flush+Reload.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- acd92f9dee2e9699d6f15796e9111ead -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
	<!-- e1dc4237303f900680735301818d6d76 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4243</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4243" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4243" source="CVE"/>
	<description>
	Heap-based buffer overflow in the readgifimage function in the gif2tiff tool in libtiff 4.0.3 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted height and width values in a GIF image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f07933002ee5f5488648cf27c5bb141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4244</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4244" source="CVE"/>
	<description>
	The LZW decompressor in the gif2tiff tool in libtiff 4.0.3 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted GIF image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0f07933002ee5f5488648cf27c5bb141 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
	<!-- db898b28994a0ce2b1deaf3ee47ec36c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104489" comment="libtiff-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104490" comment="libtiff-devel-32bit less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104491" comment="libtiff-devel less than 3.8.2-5.36.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104492" comment="libtiff less than 3.8.2-5.36.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4248</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4248" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4248" source="CVE"/>
	<description>
	The openssl_x509_parse function in openssl.c in the OpenSSL module in PHP before 5.4.18 and 5.5.x before 5.5.2 does not properly handle a '\0' character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3eaed290beadcf7a262e364bfa245f7a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
	<!-- c644113f641b16b9a35807029c904216 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4299</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4299" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4299" source="CVE"/>
	<description>
	Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4332</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4332" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4332" source="CVE"/>
	<description>
	Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) aligned_alloc functions.
	</description>
 </metadata>
<!-- 190862be14e3ed91b361e0b0a66e292a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4342</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4342" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4342" source="CVE"/>
	<description>
	xinetd does not enforce the user and group configuration directives for TCPMUX services, which causes these services to be run as root and makes it easier for remote attackers to gain privileges by leveraging another vulnerability in a service.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 02d02e7774b10b86c728bb88af735b33 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104483" comment="xinetd less than 2.3.14-14.12.1"/>
	</criteria>
	<!-- 697d9a5cda282587ef2ff61975bbcad4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104483" comment="xinetd less than 2.3.14-14.12.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4351</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4351" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4351" source="CVE"/>
	<description>
	GnuPG 1.4.x, 2.0.x, and 2.1.x treats a key flags subpacket with all bits cleared (no usage permitted) as if it has all bits set (all usage permitted), which might allow remote attackers to bypass intended cryptographic protection mechanisms by leveraging the subkey.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- acd92f9dee2e9699d6f15796e9111ead -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
	<!-- e1dc4237303f900680735301818d6d76 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4355</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4355" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4355" source="CVE"/>
	<description>
	Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4357</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4357" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4357" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 1ccbe69cba5cc8835258525263c85657 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105614" comment="glibc-32bit less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105615" comment="glibc-devel-32bit less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105616" comment="glibc-devel less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105617" comment="glibc-html less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105618" comment="glibc-i18ndata less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105619" comment="glibc-info less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105620" comment="glibc-locale-32bit less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105621" comment="glibc-locale less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105622" comment="glibc-profile-32bit less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105623" comment="glibc-profile less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105624" comment="glibc less than 2.4-31.115.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105625" comment="nscd less than 2.4-31.115.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4368</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4368" source="CVE"/>
	<description>
	The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4387</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-4387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4387" source="CVE"/>
	<description>
	net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4402</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4402" source="CVE"/>
	<description>
	The compressed packet parser in GnuPG 1.4.x before 1.4.15 and 2.0.x before 2.0.22 allows remote attackers to cause a denial of service (infinite recursion) via a crafted OpenPGP message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- acd92f9dee2e9699d6f15796e9111ead -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
	<!-- e1dc4237303f900680735301818d6d76 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104654" comment="gpg less than 1.4.2-23.27.1"/>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4470</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4470" source="CVE"/>
	<description>
	The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4483</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4483" source="CVE"/>
	<description>
	The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4494</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4494" source="CVE"/>
	<description>
	Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4520</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4520" source="CVE"/>
	<description>
	xslt.c in libxslt before 1.1.25 allows context-dependent attackers to cause a denial of service (crash) via a stylesheet that embeds a DTD, which causes a structure to be accessed as a different type.  NOTE: this issue is due to an incomplete fix for CVE-2012-2825.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 4e6a2ff81c440983e4a78087fc7ea548 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
	<!-- 8f27549488997eeff15597ab0b7a9c1a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104425" comment="libxslt-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104426" comment="libxslt-devel-32bit less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104427" comment="libxslt-devel less than 1.1.15-15.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104428" comment="libxslt less than 1.1.15-15.22.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4554</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4554" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4554" source="CVE"/>
	<description>
	Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4588</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4588" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system call, related to the do_ip_vs_set_ctl function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20134635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-4635</title>
	<affected family="unix">
		<platform>SLE SDK 10 SP4 for IBM iSeries and IBM pSeries</platform>
		<platform>SLE SDK 10 SP4 for IBM zSeries</platform>
		<platform>SLE SDK 10 SP4 for IPF</platform>
		<platform>SLE SDK 10 SP4 for X86-64</platform>
		<platform>SLE SDK 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM POWER</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for IPF</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-4635" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4635" source="CVE"/>
	<description>
	Integer overflow in the SdnToJewish function in jewish.c in the Calendar component in PHP before 5.3.26 and 5.4.x before 5.4.16 allows context-dependent attackers to cause a denial of service (application hang) via a large argument to the jdtojewish function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 052a65bd8d851aef0dd6767bb9f288d8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
		</criteria>
	</criteria>
	<!-- 512092ac1a057c2d35c038267a87ab52 -->
	<criteria operator="OR">
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4 is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077786" comment="php5-json less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria>
			<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-sdk is installed"/>
			<criteria operator="OR">
				<criterion test_ref="oval:org.opensuse.security:tst:2009077767" comment="apache2-mod_php5 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077768" comment="php5-bcmath less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077769" comment="php5-bz2 less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077770" comment="php5-calendar less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077771" comment="php5-ctype less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077772" comment="php5-curl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077773" comment="php5-dba less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077774" comment="php5-dbase less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077775" comment="php5-devel less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077776" comment="php5-dom less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077777" comment="php5-exif less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077778" comment="php5-fastcgi less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077779" comment="php5-ftp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077780" comment="php5-gd less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077781" comment="php5-gettext less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077782" comment="php5-gmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077783" comment="php5-hash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077784" comment="php5-iconv less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077785" comment="php5-imap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077787" comment="php5-ldap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077788" comment="php5-mbstring less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077789" comment="php5-mcrypt less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077790" comment="php5-mhash less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077791" comment="php5-mysql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077792" comment="php5-ncurses less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077793" comment="php5-odbc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077794" comment="php5-openssl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077795" comment="php5-pcntl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077796" comment="php5-pdo less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077797" comment="php5-pear less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077798" comment="php5-pgsql less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077799" comment="php5-posix less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077800" comment="php5-pspell less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077801" comment="php5-shmop less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077802" comment="php5-snmp less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077803" comment="php5-soap less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077804" comment="php5-sockets less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077805" comment="php5-sqlite less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077806" comment="php5-suhosin less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077807" comment="php5-sysvmsg less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077808" comment="php5-sysvsem less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077809" comment="php5-sysvshm less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077816" comment="php5-tidy less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077810" comment="php5-tokenizer less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077811" comment="php5-wddx less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077812" comment="php5-xmlreader less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077813" comment="php5-xmlrpc less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077814" comment="php5-xsl less than 5.2.14-0.42.1"/>
				<criterion test_ref="oval:org.opensuse.security:tst:2009077815" comment="php5-zlib less than 5.2.14-0.42.1"/>
			</criteria>
		</criteria></criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5018</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5018" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5018" source="CVE"/>
	<description>
	The is_asn1 function in strongSwan 4.1.11 through 5.0.4 does not properly validate the return value of the asn1_length function, which allows remote attackers to cause a denial of service (segmentation fault) via a (1) XAuth username, (2) EAP identity, or (3) PEM encoded file that starts with a 0x04, 0x30, or 0x31 character followed by an ASN.1 length value that triggers an integer overflow.
	</description>
 </metadata>
<!-- e6c589e7bbb7423af132803861e03b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104842" comment="strongswan-doc less than 4.4.0-6.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104843" comment="strongswan less than 4.4.0-6.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5372</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5372" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5372" source="CVE"/>
	<description>
	The XML4J parser in IBM WebSphere Message Broker 6.1 before 6.1.0.12, 7.0 before 7.0.0.7, and 8.0 before 8.0.0.4 and IBM Integration Bus 9.0 before 9.0.0.1 allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document that triggers expansion for many entities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5375</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5375" source="CVE"/>
	<description>
	Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, 6.0.0 before SR15, and 5.0.0 before SR16 FP4 allows remote attackers to access restricted classes via unspecified vectors related to XML and XSL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5456</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5456" source="CVE"/>
	<description>
	The com.ibm.rmi.io.SunSerializableFactory class in IBM Java SDK 7.0.0 before SR6 allows remote attackers to bypass a sandbox protection mechanism and execute arbitrary code via vectors related to deserialization inside the AccessController doPrivileged block.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5457</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5457" source="CVE"/>
	<description>
	Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6, 6.0.1 before SR7, and 6.0.0 before SR15 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5458</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5458" source="CVE"/>
	<description>
	Unspecified vulnerability in IBM Java SDK 7.0.0 before SR6 allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5590</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5590" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5591</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5591" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5592</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5592" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 25.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5593</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5593" source="CVE"/>
	<description>
	The SELECT element implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly restrict the nature or placement of HTML within a dropdown menu, which allows remote attackers to spoof the address bar or conduct clickjacking attacks via vectors that trigger navigation off of a page containing this element.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5595</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5595" source="CVE"/>
	<description>
	The JavaScript engine in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly allocate memory for unspecified functions, which allows remote attackers to conduct buffer overflow attacks via a crafted web page.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5596</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5596" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5596" source="CVE"/>
	<description>
	The cycle collection (CC) implementation in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 does not properly determine the thread for release of an image object, which allows remote attackers to execute arbitrary code or cause a denial of service (race condition and application crash) via a large HTML document containing IMG elements, as demonstrated by the Never-Ending Reddit on reddit.com.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5597</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5597" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5597" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsDocLoader::doStopDocumentLoad function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving a state-change event during an update of the offline cache.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135598" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5598</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5598" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5598" source="CVE"/>
	<description>
	PDF.js in Mozilla Firefox before 25.0 and Firefox ESR 24.x before 24.1 does not properly handle the appending of an IFRAME element, which allows remote attackers to read arbitrary files or execute arbitrary JavaScript code with chrome privileges by using this element within an embedded PDF object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135599" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5599</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5599" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5599" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsIPresShell::GetPresContext function in the PresShell (aka presentation shell) implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via vectors involving a CANVAS element, a mozTextStyle attribute, and an onresize event.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135600" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5600</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5600" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5600" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsIOService::NewChannelFromURIWithProxyFlags function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors involving a blob: URL.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5601</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5601" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5601" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsEventListenerManager::SetEventHandler function in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code via vectors related to a memory allocation through the garbage collection (GC) API.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5602</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5602" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5602" source="CVE"/>
	<description>
	The Worker::SetEventListener function in the Web workers implementation in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to direct proxies.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135603" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5603</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5603" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5603" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsContentUtils::ContentIsHostIncludingDescendantOf function in Mozilla Firefox before 25.0, Firefox ESR 24.x before 24.1, Thunderbird before 24.1, and SeaMonkey before 2.22 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving HTML document templates.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5604</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5604" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5604" source="CVE"/>
	<description>
	The txXPathNodeUtils::getBaseURI function in the XSLT processor in Mozilla Firefox before 25.0, Firefox ESR 17.x before 17.0.10 and 24.x before 24.1, Thunderbird before 24.1, Thunderbird ESR 17.x before 17.0.10, and SeaMonkey before 2.22 does not properly initialize data, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow and application crash) via crafted documents.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5605</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5605" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5605" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06e5fb9c1bb44bc958d26f52b71b7269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 3847822af2a8723bbe4fbc4f642205f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135606" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5606</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5606" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5606" source="CVE"/>
	<description>
	The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow remote attackers to bypass intended access restrictions via a crafted certificate.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06e5fb9c1bb44bc958d26f52b71b7269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 3847822af2a8723bbe4fbc4f642205f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5607</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5607" source="CVE"/>
	<description>
	Integer overflow in the PL_ArenaAllocate function in Mozilla Netscape Portable Runtime (NSPR) before 4.10.2, as used in Firefox before 25.0.1, Firefox ESR 17.x before 17.0.11 and 24.x before 24.1.1, and SeaMonkey before 2.22.1, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted X.509 certificate, a related issue to CVE-2013-1741.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06e5fb9c1bb44bc958d26f52b71b7269 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 3847822af2a8723bbe4fbc4f642205f8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104743" comment="mozilla-nspr-32bit less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104744" comment="mozilla-nspr-devel less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104745" comment="mozilla-nspr less than 4.10.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104746" comment="mozilla-nss-32bit less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104747" comment="mozilla-nss-devel less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104748" comment="mozilla-nss-tools less than 3.15.3-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104749" comment="mozilla-nss less than 3.15.3-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5609</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5609" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5609" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5610</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5610" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5610" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135611" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5611</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5611" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5611" source="CVE"/>
	<description>
	Mozilla Firefox before 26.0 does not properly remove the Application Installation doorhanger, which makes it easier for remote attackers to spoof a Web App installation site by controlling the timing of page navigation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5612</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5612" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5612" source="CVE"/>
	<description>
	Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 makes it easier for remote attackers to inject arbitrary web script or HTML by leveraging a Same Origin Policy violation triggered by lack of a charset parameter in a Content-Type HTTP header.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5613</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5613" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5613" source="CVE"/>
	<description>
	Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5614</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5614" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5614" source="CVE"/>
	<description>
	Mozilla Firefox before 26.0 and SeaMonkey before 2.23 do not properly consider the sandbox attribute of an IFRAME element during processing of a contained OBJECT element, which allows remote attackers to bypass intended sandbox restrictions via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5615</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5615" source="CVE"/>
	<description>
	The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5616</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5616" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5616" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5618</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5618" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5618" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5619</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-5619" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5619" source="CVE"/>
	<description>
	Multiple integer overflows in the binary-search implementation in SpiderMonkey in Mozilla Firefox before 26.0 and SeaMonkey before 2.23 might allow remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5772</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5772" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5772" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java SE component in Oracle Java SE Java SE 7u40 and earlier and Java SE 6u60 and earlier allows remote attackers to affect integrity via unknown vectors related to jhat.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5774</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5774" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5774" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5776</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5776" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5776" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5778</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5778" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5778" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, 6u60 and earlier, 5.0u51 and earlier, and Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5780</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5780" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5780" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5782</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5782" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5782" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5783</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5783" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5783" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Swing.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5784</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5784" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5784" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to SCRIPTING.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5787</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5787" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5787" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5789, CVE-2013-5824, CVE-2013-5832, and CVE-2013-5852.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5788</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5788" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5789</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5789" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5787, CVE-2013-5824, CVE-2013-5832, and CVE-2013-5852.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5790</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5790" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to BEANS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5797</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5797" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and JavaFX 2.2.40 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5800</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5800" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JGSS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5801</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5801" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5802</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5802" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXP.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5803</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5803" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5804</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5804" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5804" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, and JRockit R27.7.6 and earlier allows remote attackers to affect confidentiality and integrity via unknown vectors related to Javadoc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135809" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5809</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5809" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5809" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5829.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5812</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5812" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5812" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5814</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5814" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5817</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5817" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5818</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5818" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5819 and CVE-2013-5831.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5819</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5819" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5819" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5818 and CVE-2013-5831.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5820</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5820" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5820" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via vectors related to JAX-WS.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5823</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5823" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5823" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via unknown vectors related to Security.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5824</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5824" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5824" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5787, CVE-2013-5789, CVE-2013-5832, and CVE-2013-5852.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5825</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5825" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5825" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JAXP.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5829</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5829" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5829" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2013-5809.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5830</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5830" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5830" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5831</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5831" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5818 and CVE-2013-5819.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5832</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5832" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5832" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5787, CVE-2013-5789, CVE-2013-5824, and CVE-2013-5852.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5838</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5838" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5838" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u25 and earlier, and Java SE Embedded 7u25 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5840</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5840" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5842</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5842" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5850.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5843</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5843" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JavaFX 2.2.40 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5848</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5848" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, and JavaFX 2.2.40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5849</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5849" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to AWT.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5081cdae28bd8b3832e528c33135eb2a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 72ed1fe5b55bbe85bd66cb799815e617 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104764" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104765" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104766" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104767" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104768" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104769" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104770" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104771" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104772" comment="java-1_5_0-ibm less than 1.5.0_sr16.4-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5850</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5850" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2013-5842.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5851</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5851" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u40 and earlier and Java SE Embedded 7u40 and earlier allows remote attackers to affect confidentiality via vectors related to JAXP.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 59cacab82a07026e7b534dd6b64bd1d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104773" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104774" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104775" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104776" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104777" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104778" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104779" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104780" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104781" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.9.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104782" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.9.9.1"/>
		</criteria>
	</criteria>
	<!-- 92a6b678be36dd2d8ecf92f74430bc5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104783" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104784" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104785" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104786" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104787" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104788" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104789" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104790" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104791" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.0-0.14.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104792" comment="java-1_6_0-ibm less than 1.6.0_sr15.0-0.14.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5878</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5878" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU.  Oracle has not commented on third-party claims that the Security component does not properly handle null XML namespace (xmlns) attributes during XML document canonicalization, which allows attackers to escape the sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5884</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5884" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5884" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an incorrect check for code permissions by CORBA stub factories.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5887</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5887" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5887" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5888</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5888" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5888" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, when running with GNOME, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5889</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5889" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5889" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, CVE-2014-0418, and CVE-2014-0424.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5896</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5896" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5896" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that com.sun.corba.se and its sub-packages are not included on the restricted package list.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5898</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5898" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5898" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2014-0375 and CVE-2014-0403.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5899</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5899" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5899" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5907</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5907" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5907" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is due to incorrect input validation in LookupProcessor.cpp in the ICU Layout Engine, which allows attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted font file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20135910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-5910</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-5910" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5910" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45, Java SE Embedded 7u45, and OpenJDK 7 allows remote attackers to affect integrity via unknown vectors related to Security.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that CanonicalizerBase.java in the XML canonicalizer allows untrusted code to access mutable byte arrays.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6075</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-6075" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6075" source="CVE"/>
	<description>
	The compare_dn function in utils/identification.c in strongSwan 4.3.3 through 5.1.1 allows (1) remote attackers to cause a denial of service (out-of-bounds read, NULL pointer dereference, and daemon crash) or (2) remote authenticated users to impersonate arbitrary users and bypass access restrictions via a crafted ID_DER_ASN1_DN ID, related to an "insufficient length check" during identity comparison.
	</description>
 </metadata>
<!-- e6c589e7bbb7423af132803861e03b33 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104842" comment="strongswan-doc less than 4.4.0-6.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104843" comment="strongswan less than 4.4.0-6.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6382</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6382" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6382" source="CVE"/>
	<description>
	Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 00bbe32fc40478b12864bce2c72e300b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104873" comment="kernel-bigsmp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104877" comment="kernel-kdumppae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104881" comment="kernel-vmi less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104882" comment="kernel-vmipae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104884" comment="kernel-xenpae less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 92e5a7d9af3ca4f050703bcbf2268c9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- a9f7b560616d678d5217f211234abdba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6383</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6383" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6383" source="CVE"/>
	<description>
	The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6405</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6405" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6405" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, CVE-2013-7281.  Reason: This candidate is a duplicate of CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, and CVE-2013-7281.  Notes: All CVE users should reference CVE-2013-7263, CVE-2013-7264, CVE-2013-7265, and/or CVE-2013-7281 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6420" source="CVE"/>
	<description>
	The asn1_time_to_time_t function in ext/openssl/openssl.c in PHP before 5.3.28, 5.4.x before 5.4.23, and 5.5.x before 5.5.7 does not properly parse (1) notBefore and (2) notAfter timestamps in X.509 certificates, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted certificate that is not properly handled by the openssl_x509_parse function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3eaed290beadcf7a262e364bfa245f7a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
	<!-- c644113f641b16b9a35807029c904216 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6438</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6438" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6438" source="CVE"/>
	<description>
	The dav_xml_get_cdata function in main/util.c in the mod_dav module in the Apache HTTP Server before 2.4.8 does not properly remove whitespace characters from CDATA sections, which allows remote attackers to cause a denial of service (daemon crash) via a crafted DAV WRITE request.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0593c1f59d8a810c00150b05cea3af2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104751" comment="apache2-devel less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104752" comment="apache2-doc less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104753" comment="apache2-example-pages less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104754" comment="apache2-prefork less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104755" comment="apache2-worker less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104756" comment="apache2 less than 2.2.3-16.32.51.2"/>
		</criteria>
	</criteria>
	<!-- 0ddc907bde6fcbad1e94944d867f60dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104757" comment="apache2-devel less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104758" comment="apache2-doc less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104759" comment="apache2-example-pages less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104760" comment="apache2-prefork less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104761" comment="apache2-worker less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104762" comment="apache2 less than 2.2.3-16.50.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6463</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6463" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, CVE-2013-7271.  Reason: This candidate is a duplicate of CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and CVE-2013-7271.  Notes: All CVE users should reference CVE-2013-7266, CVE-2013-7267, CVE-2013-7268, CVE-2013-7269, CVE-2013-7270, and/or CVE-2013-7271 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6497" source="CVE"/>
	<description>
	clamscan in ClamAV before 0.98.5, when using -a option, allows remote attackers to cause a denial of service (crash) as demonstrated by the jwplayer.js file.
	</description>
 </metadata>
<!-- b71adb6b19097f47d8e0eb43a5efa4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104885" comment="clamav less than 0.98.5-0.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6629</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6629" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6629" source="CVE"/>
	<description>
	The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6671</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-6671" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6671" source="CVE"/>
	<description>
	The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6672</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-6672" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6672" source="CVE"/>
	<description>
	Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6673</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2013-6673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6673" source="CVE"/>
	<description>
	Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6885</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6885" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885" source="CVE"/>
	<description>
	The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a crafted application, aka the errata 793 issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 5877b583cb5aa03d08203d887cc47ee3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104622" comment="xen-devel less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104623" comment="xen-doc-html less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104624" comment="xen-doc-pdf less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104625" comment="xen-doc-ps less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104626" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104627" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104628" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104629" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104630" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104631" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104632" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104633" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104634" comment="xen-libs-32bit less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104635" comment="xen-libs less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104636" comment="xen-tools-domU less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104637" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104638" comment="xen-tools less than 3.2.3_17040_46-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104639" comment="xen less than 3.2.3_17040_46-0.7.1"/>
		</criteria>
	</criteria>
	<!-- 6f43bf900a8ce3d35255c35946732753 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104604" comment="xen-devel less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104605" comment="xen-doc-html less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104606" comment="xen-doc-pdf less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104607" comment="xen-doc-ps less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104608" comment="xen-kmp-bigsmp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104609" comment="xen-kmp-debug less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104610" comment="xen-kmp-default less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104611" comment="xen-kmp-kdump less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104612" comment="xen-kmp-kdumppae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104613" comment="xen-kmp-smp less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104614" comment="xen-kmp-vmi less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104615" comment="xen-kmp-vmipae less than 3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104616" comment="xen-libs-32bit less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104617" comment="xen-libs less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104618" comment="xen-tools-domU less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104619" comment="xen-tools-ioemu less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104620" comment="xen-tools less than 3.2.3_17040_28-0.6.21.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104621" comment="xen less than 3.2.3_17040_28-0.6.21.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20136954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-6954</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-6954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6954" source="CVE"/>
	<description>
	The png_do_expand_palette function in libpng before 1.6.8 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via (1) a PLTE chunk of zero bytes or (2) a NULL palette, related to pngrtran.c and pngset.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7263</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-7263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7263" source="CVE"/>
	<description>
	The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 00bbe32fc40478b12864bce2c72e300b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104873" comment="kernel-bigsmp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104877" comment="kernel-kdumppae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104881" comment="kernel-vmi less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104882" comment="kernel-vmipae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104884" comment="kernel-xenpae less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 92e5a7d9af3ca4f050703bcbf2268c9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- a9f7b560616d678d5217f211234abdba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7264</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-7264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7264" source="CVE"/>
	<description>
	The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 00bbe32fc40478b12864bce2c72e300b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104873" comment="kernel-bigsmp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104877" comment="kernel-kdumppae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104881" comment="kernel-vmi less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104882" comment="kernel-vmipae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104884" comment="kernel-xenpae less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 92e5a7d9af3ca4f050703bcbf2268c9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- a9f7b560616d678d5217f211234abdba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7265</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-7265" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7265" source="CVE"/>
	<description>
	The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 00bbe32fc40478b12864bce2c72e300b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104873" comment="kernel-bigsmp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104877" comment="kernel-kdumppae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104881" comment="kernel-vmi less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104882" comment="kernel-vmipae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104884" comment="kernel-xenpae less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 92e5a7d9af3ca4f050703bcbf2268c9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- a9f7b560616d678d5217f211234abdba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20137423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2013-7423</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2013-7423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7423" source="CVE"/>
	<description>
	The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
	</description>
 </metadata>
<!-- ddad3e23b15c5919bf5e29a0fcedc637 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107927" comment="glibc-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107928" comment="glibc-devel-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107929" comment="glibc-devel less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107930" comment="glibc-html less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107931" comment="glibc-i18ndata less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107932" comment="glibc-info less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107933" comment="glibc-locale-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107934" comment="glibc-locale less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107935" comment="glibc-profile-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107936" comment="glibc-profile less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107937" comment="glibc less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107938" comment="nscd less than 2.4-31.117.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0076</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0076" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0076" source="CVE"/>
	<description>
	The Montgomery ladder implementation in OpenSSL through 1.0.0l does not ensure that certain swap operations have a constant-time behavior, which makes it easier for local users to obtain ECDSA nonces via a FLUSH+RELOAD cache side-channel attack.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 13729e3b9da09233086c747080dc0f39 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104915" comment="openssl-32bit less than 0.9.8a-18.80.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104916" comment="openssl-devel-32bit less than 0.9.8a-18.80.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104917" comment="openssl-devel less than 0.9.8a-18.80.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104918" comment="openssl-doc less than 0.9.8a-18.80.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104919" comment="openssl less than 0.9.8a-18.80.5"/>
		</criteria>
	</criteria>
	<!-- 5e45bbc40560ab190992f4af60dbbccc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104920" comment="openssl-32bit less than 0.9.8a-18.45.75.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104921" comment="openssl-devel-32bit less than 0.9.8a-18.45.75.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104922" comment="openssl-devel less than 0.9.8a-18.45.75.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104923" comment="openssl-doc less than 0.9.8a-18.45.75.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104924" comment="openssl less than 0.9.8a-18.45.75.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140092" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0092</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0092" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0092" source="CVE"/>
	<description>
	lib/x509/verify.c in GnuTLS before 3.1.22 and 3.2.x before 3.2.12 does not properly handle unspecified errors when verifying X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 37d0e9642492b343b6f431f0fecb7b5b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
	<!-- 3be1f1e8cc06d24d3e6d4ba2c4abdea4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104331" comment="gnutls-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104332" comment="gnutls-devel-32bit less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104333" comment="gnutls-devel less than 1.2.10-13.38.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104334" comment="gnutls less than 1.2.10-13.38.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0098</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0098" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0098" source="CVE"/>
	<description>
	The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server before 2.4.8 allows remote attackers to cause a denial of service (segmentation fault and daemon crash) via a crafted cookie that is not properly handled during truncation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0593c1f59d8a810c00150b05cea3af2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104751" comment="apache2-devel less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104752" comment="apache2-doc less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104753" comment="apache2-example-pages less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104754" comment="apache2-prefork less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104755" comment="apache2-worker less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104756" comment="apache2 less than 2.2.3-16.32.51.2"/>
		</criteria>
	</criteria>
	<!-- 0ddc907bde6fcbad1e94944d867f60dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104757" comment="apache2-devel less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104758" comment="apache2-doc less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104759" comment="apache2-example-pages less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104760" comment="apache2-prefork less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104761" comment="apache2-worker less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104762" comment="apache2 less than 2.2.3-16.50.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0181" source="CVE"/>
	<description>
	The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0221</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0221" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221" source="CVE"/>
	<description>
	The dtls1_get_message_fragment function in d1_both.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (recursion and client crash) via a DTLS hello message in an invalid DTLS handshake.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06090ed98c412d84909da7f988402089 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104925" comment="openssl-32bit less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104926" comment="openssl-devel-32bit less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104927" comment="openssl-devel less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104928" comment="openssl-doc less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104929" comment="openssl less than 0.9.8a-18.45.77.1"/>
		</criteria>
	</criteria>
	<!-- ae77e66ba2a03bee961e56bc2d1daee6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104930" comment="openssl-32bit less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104931" comment="openssl-devel-32bit less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104932" comment="openssl-devel less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104933" comment="openssl-doc less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104934" comment="openssl less than 0.9.8a-18.82.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0222</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0222" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0222" source="CVE"/>
	<description>
	Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows remote attackers to cause a denial of service (crash) via a large L2 table in a QCOW version 1 image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
		</criteria>
	</criteria>
	<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0224</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0224" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224" source="CVE"/>
	<description>
	OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the "CCS Injection" vulnerability.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06090ed98c412d84909da7f988402089 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104925" comment="openssl-32bit less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104926" comment="openssl-devel-32bit less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104927" comment="openssl-devel less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104928" comment="openssl-doc less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104929" comment="openssl less than 0.9.8a-18.45.77.1"/>
		</criteria>
	</criteria>
	<!-- ae77e66ba2a03bee961e56bc2d1daee6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104930" comment="openssl-32bit less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104931" comment="openssl-devel-32bit less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104932" comment="openssl-devel less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104933" comment="openssl-doc less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104934" comment="openssl less than 0.9.8a-18.82.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0226</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0226" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0226" source="CVE"/>
	<description>
	Race condition in the mod_status module in the Apache HTTP Server before 2.4.10 allows remote attackers to cause a denial of service (heap-based buffer overflow), or possibly obtain sensitive credential information or execute arbitrary code, via a crafted request that triggers improper scoreboard handling within the status_handler function in modules/generators/mod_status.c and the lua_ap_scoreboard_worker function in modules/lua/lua_request.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0593c1f59d8a810c00150b05cea3af2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104751" comment="apache2-devel less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104752" comment="apache2-doc less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104753" comment="apache2-example-pages less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104754" comment="apache2-prefork less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104755" comment="apache2-worker less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104756" comment="apache2 less than 2.2.3-16.32.51.2"/>
		</criteria>
	</criteria>
	<!-- 0ddc907bde6fcbad1e94944d867f60dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104757" comment="apache2-devel less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104758" comment="apache2-doc less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104759" comment="apache2-example-pages less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104760" comment="apache2-prefork less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104761" comment="apache2-worker less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104762" comment="apache2 less than 2.2.3-16.50.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0231</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0231" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0231" source="CVE"/>
	<description>
	The mod_cgid module in the Apache HTTP Server before 2.4.10 does not have a timeout mechanism, which allows remote attackers to cause a denial of service (process hang) via a request to a CGI script that does not read from its stdin file descriptor.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 0593c1f59d8a810c00150b05cea3af2f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104751" comment="apache2-devel less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104752" comment="apache2-doc less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104753" comment="apache2-example-pages less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104754" comment="apache2-prefork less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104755" comment="apache2-worker less than 2.2.3-16.32.51.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104756" comment="apache2 less than 2.2.3-16.32.51.2"/>
		</criteria>
	</criteria>
	<!-- 0ddc907bde6fcbad1e94944d867f60dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104757" comment="apache2-devel less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104758" comment="apache2-doc less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104759" comment="apache2-example-pages less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104760" comment="apache2-prefork less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104761" comment="apache2-worker less than 2.2.3-16.50.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104762" comment="apache2 less than 2.2.3-16.50.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0368</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0368" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0368" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0373</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0373" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0373" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and OpenJDK 7, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serviceability.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to throwing of an incorrect exception when SnmpStatusException should have been used in the SNMP implementation, which allows attackers to escape the sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0375</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0375" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0375" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5898 and CVE-2014-0403.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0376</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0376" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAXP.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to an improper check for "code permissions when creating document builder factories."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0387</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0387" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0387" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and Java SE 7u45, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0403</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0403" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0403" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5898 and CVE-2014-0375.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0410</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0410" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0410" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0415, CVE-2014-0418, and CVE-2014-0424.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0411</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0411" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0411" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information about encryption keys via a timing discrepancy during the TLS/SSL handshake.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0415</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0415" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0415" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0418, and CVE-2014-0424.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0416</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0416" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0416" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect integrity via vectors related to JAAS.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to how principals are set for the Subject class, which allows attackers to escape the sandbox using deserialization of a crafted Subject instance.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0417</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0417" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0417" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JavaFX 2.2.45; and Java SE Embedded 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0422</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0422" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JNDI.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to missing package access checks in the Naming / JNDI component, which allows attackers to escape the sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0423</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0423" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; JRockit R27.7.7 and R28.2.9; Java SE Embedded 7u45; and OpenJDK 7 allows remote authenticated users to affect confidentiality and availability via unknown vectors related to Beans.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that this issue is an XML External Entity (XXE) vulnerability in DocumentHandler.java, related to Beans decoding.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0424</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0424" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0424" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u65 and 7u45 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2013-5889, CVE-2013-5902, CVE-2014-0410, CVE-2014-0415, and CVE-2014-0418.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0428</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0428" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45; Java SE Embedded 7u45; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA.  NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to "insufficient security checks in IIOP streams," which allows attackers to escape the sandbox.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31bff4adf7f4091ce92bf4450ff8b1f3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 80342541418cc3f0cde43530feba3e08 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104853" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104854" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104855" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104856" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104857" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104858" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104859" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104860" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104861" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.15.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104862" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.15.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- abb9b287dc1d7479726b01b15ea2eeb3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104863" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104864" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104865" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104866" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104867" comment="java-1_6_0-ibm-devel less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104868" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104869" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104870" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104871" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr15.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104872" comment="java-1_6_0-ibm less than 1.6.0_sr15.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
	<!-- b4764fb7eed43ec4dce07d7be78e74c3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104844" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104845" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104846" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104847" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104848" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104849" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104850" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104851" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.5-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104852" comment="java-1_5_0-ibm less than 1.5.0_sr16.5-0.6.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0429</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0429" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0429" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0446</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0446" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0449</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0449" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0451</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0451" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0451" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-2412.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0452</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0452" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0452" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0458 and CVE-2014-2423.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0453</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0453" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0453" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0457</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0457" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, SE 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0458</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0458" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-2423.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0459</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0459" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u51 and 8, and Java SE Embedded 7u51, allows remote attackers to affect availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0460</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0460" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0460" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality and integrity via vectors related to JNDI.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0461</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0461" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0475</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0475" source="CVE"/>
	<description>
	Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.
	</description>
 </metadata>
<!-- ddad3e23b15c5919bf5e29a0fcedc637 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107927" comment="glibc-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107928" comment="glibc-devel-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107929" comment="glibc-devel less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107930" comment="glibc-html less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107931" comment="glibc-i18ndata less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107932" comment="glibc-info less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107933" comment="glibc-locale-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107934" comment="glibc-locale less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107935" comment="glibc-profile-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107936" comment="glibc-profile less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107937" comment="glibc less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107938" comment="nscd less than 2.4-31.117.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20140878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-0878</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-0878" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0878" source="CVE"/>
	<description>
	The IBMSecureRandom component in the IBMJCE and IBMSecureRandom cryptographic providers in IBM SDK Java Technology Edition 5.0 before Service Refresh 16 FP6, 6 before Service Refresh 16, 6.0.1 before Service Refresh 8, 7 before Service Refresh 7, and 7R1 before Service Refresh 1 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms by predicting the random number generator's output.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1444</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1444" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1444" source="CVE"/>
	<description>
	The fst_get_iface function in drivers/net/wan/farsync.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCWANDEV ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1445</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1445" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1445" source="CVE"/>
	<description>
	The wanxl_ioctl function in drivers/net/wan/wanxl.c in the Linux kernel before 3.11.7 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1446</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1446" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1446" source="CVE"/>
	<description>
	The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- bd99d2fcd47fefd9c76757c1e9e1cccb -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- d046a694b83b003f9bb6b21b6c0e8e6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
	<!-- e59a3c9997ba1bed5bbf01d34d34a3d7 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104415" comment="kernel-bigsmp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104411" comment="kernel-debug less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104408" comment="kernel-default less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104412" comment="kernel-kdump less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104416" comment="kernel-kdumppae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104413" comment="kernel-smp less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104409" comment="kernel-source less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104410" comment="kernel-syms less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104417" comment="kernel-vmi less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104418" comment="kernel-vmipae less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104414" comment="kernel-xen less than 2.6.16.60-0.105.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104419" comment="kernel-xenpae less than 2.6.16.60-0.105.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1477</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1477" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1479</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1479" source="CVE"/>
	<description>
	The System Only Wrapper (SOW) implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent certain cloning operations, which allows remote attackers to bypass intended restrictions on XUL content via vectors involving XBL content scopes.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1480</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1480" source="CVE"/>
	<description>
	The file-download implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 does not properly restrict the timing of button selections, which allows remote attackers to conduct clickjacking attacks, and trigger unintended launching of a downloaded file, via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1481</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1481" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1481" source="CVE"/>
	<description>
	Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allow remote attackers to bypass intended restrictions on window objects by leveraging inconsistency in native getter methods across different JavaScript engines.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1482</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1482" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1482" source="CVE"/>
	<description>
	RasterImage.cpp in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 does not prevent access to discarded data, which allows remote attackers to execute arbitrary code or cause a denial of service (incorrect write operations) via crafted image data, as demonstrated by Goo Create.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1483</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1483" source="CVE"/>
	<description>
	Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allow remote attackers to bypass the Same Origin Policy and obtain sensitive information by using an IFRAME element in conjunction with certain timing measurements involving the document.caretPositionFromPoint and document.elementFromPoint functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1484</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1484" source="CVE"/>
	<description>
	Mozilla Firefox before 27.0 on Android 4.2 and earlier creates system-log entries containing profile paths, which allows attackers to obtain sensitive information via a crafted application.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1485</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1485" source="CVE"/>
	<description>
	The Content Security Policy (CSP) implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 operates on XSLT stylesheets according to style-src directives instead of script-src directives, which might allow remote attackers to execute arbitrary XSLT code by leveraging insufficient style-src restrictions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1486</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1486" source="CVE"/>
	<description>
	Use-after-free vulnerability in the imgRequestProxy function in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving unspecified Content-Type values for image data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1487</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1487" source="CVE"/>
	<description>
	The Web workers implementation in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, and SeaMonkey before 2.24 allows remote attackers to bypass the Same Origin Policy and obtain sensitive authentication information via vectors involving error messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1488</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1488" source="CVE"/>
	<description>
	The Web workers implementation in Mozilla Firefox before 27.0 and SeaMonkey before 2.24 allows remote attackers to execute arbitrary code via vectors involving termination of a worker process that has performed a cross-thread object-passing operation in conjunction with use of asm.js.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1489</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1489" source="CVE"/>
	<description>
	Mozilla Firefox before 27.0 does not properly restrict access to about:home buttons by script on other pages, which allows user-assisted remote attackers to cause a denial of service (session restore) via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1490</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1490" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1490" source="CVE"/>
	<description>
	Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1491</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1491" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1492</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1492" source="CVE"/>
	<description>
	The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1493</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1493" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1494</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1494" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1496</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1496" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1496" source="CVE"/>
	<description>
	Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 might allow local users to gain privileges by modifying the extracted Mar contents during an update.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1497" source="CVE"/>
	<description>
	The mozilla::WaveReader::DecodeAudioData function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process heap memory, cause a denial of service (out-of-bounds read and application crash), or possibly have unspecified other impact via a crafted WAV file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1498" source="CVE"/>
	<description>
	The crypto.generateCRMFRequest method in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not properly validate a certain key type, which allows remote attackers to cause a denial of service (application crash) via vectors that trigger generation of a key that supports the Elliptic Curve ec-dual-use algorithm.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1499</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1499" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1499" source="CVE"/>
	<description>
	Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to spoof the domain name in the WebRTC (1) camera or (2) microphone permission prompt by triggering navigation at a certain time during generation of this prompt.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1500" source="CVE"/>
	<description>
	Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to cause a denial of service (resource consumption and application hang) via onbeforeunload events that trigger background JavaScript execution.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1501</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1501" source="CVE"/>
	<description>
	Mozilla Firefox before 28.0 on Android allows remote attackers to bypass the Same Origin Policy and access arbitrary file: URLs via vectors involving the "Open Link in New Tab" menu selection.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1502</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1502" source="CVE"/>
	<description>
	The (1) WebGL.compressedTexImage2D and (2) WebGL.compressedTexSubImage2D functions in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 allow remote attackers to bypass the Same Origin Policy and render content in a different domain via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1504</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1504" source="CVE"/>
	<description>
	The session-restore feature in Mozilla Firefox before 28.0 and SeaMonkey before 2.25 does not consider the Content Security Policy of a data: URL, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted document that is accessed after a browser restart.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1505</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1505" source="CVE"/>
	<description>
	The SVG filter implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive displacement-correlation information, and possibly bypass the Same Origin Policy and read text from a different domain, via a timing attack involving feDisplacementMap elements, a related issue to CVE-2013-1693.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1508</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1508" source="CVE"/>
	<description>
	The libxul.so!gfxContext::Polygon function in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to obtain sensitive information from process memory, cause a denial of service (out-of-bounds read and application crash), or possibly bypass the Same Origin Policy via vectors involving MathML polygon rendering.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1509</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1509" source="CVE"/>
	<description>
	Buffer overflow in the _cairo_truetype_index_to_ucs4 function in cairo, as used in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25, allows remote attackers to execute arbitrary code via a crafted extension that renders fonts in a PDF document.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1510</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1510" source="CVE"/>
	<description>
	The Web IDL implementation in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary JavaScript code with chrome privileges by using an IDL fragment to trigger a window.open call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1511</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1511" source="CVE"/>
	<description>
	Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allow remote attackers to bypass the popup blocker via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1512</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1512" source="CVE"/>
	<description>
	Use-after-free vulnerability in the TypeObject class in the JavaScript engine in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 allows remote attackers to execute arbitrary code by triggering extensive memory consumption while garbage collection is occurring, as demonstrated by improper handling of BumpChunk objects.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1513</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1513" source="CVE"/>
	<description>
	TypedArrayObject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not prevent a zero-length transition during use of an ArrayBuffer object, which allows remote attackers to execute arbitrary code or cause a denial of service (heap-based out-of-bounds write or read) via a crafted web site.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1514</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1514" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1514" source="CVE"/>
	<description>
	vmtypedarrayobject.cpp in Mozilla Firefox before 28.0, Firefox ESR 24.x before 24.4, Thunderbird before 24.4, and SeaMonkey before 2.25 does not validate the length of the destination array before a copy operation, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by triggering incorrect use of the TypedArrayObject class.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1518</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1518" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1523</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1523" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1523" source="CVE"/>
	<description>
	Heap-based buffer overflow in the read_u32 function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted JPEG image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1524</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1524" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1524" source="CVE"/>
	<description>
	The nsXBLProtoImpl::InstallImplementation function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 does not properly check whether objects are XBL objects, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow) via crafted JavaScript code that accesses a non-XBL object as if it were an XBL object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1529</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1529" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1529" source="CVE"/>
	<description>
	The Web Notification API in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to bypass intended source-component restrictions and execute arbitrary JavaScript code in a privileged context via a crafted web page for which Notification.permission is granted.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1530</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1530" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1530" source="CVE"/>
	<description>
	The docshell implementation in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to trigger the loading of a URL with a spoofed baseURI property, and conduct cross-site scripting (XSS) attacks, via a crafted web site that performs history navigation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1531</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1531" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsGenericHTMLElement::GetWidthHeightForImage function in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving an imgLoader object that is not properly handled during an image-resize operation.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1532</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1532" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsHostResolver::ConditionallyRefreshRecord function in libxul.so in Mozilla Firefox before 29.0, Firefox ESR 24.x before 24.5, Thunderbird before 24.5, and SeaMonkey before 2.26 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to host resolution.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 286e8d629532f85ab01bea1a26438953 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
	<!-- 6deb2806a7e4f6bdaa0908761932d7dd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104692" comment="MozillaFirefox-translations less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104693" comment="MozillaFirefox less than 24.5.0esr-0.7.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104694" comment="firefox-atk-32bit less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104695" comment="firefox-atk less than 1.28.0-0.7.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104696" comment="firefox-cairo-32bit less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104697" comment="firefox-cairo less than 1.8.0-0.10.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104698" comment="firefox-fontconfig-32bit less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104699" comment="firefox-fontconfig less than 2.6.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104700" comment="firefox-freetype2-32bit less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104701" comment="firefox-freetype2 less than 2.3.7-0.35.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104702" comment="firefox-glib2-32bit less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104703" comment="firefox-glib2 less than 2.22.5-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104704" comment="firefox-gtk2-32bit less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104705" comment="firefox-gtk2-lang less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104706" comment="firefox-gtk2 less than 2.18.9-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104707" comment="firefox-libgcc_s1-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104708" comment="firefox-libgcc_s1 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104709" comment="firefox-libstdc++6-32bit less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104710" comment="firefox-libstdc++6 less than 4.7.2_20130108-0.22.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104711" comment="firefox-pango-32bit less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104712" comment="firefox-pango less than 1.26.2-0.9.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104713" comment="firefox-pcre-32bit less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104714" comment="firefox-pcre less than 7.8-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104715" comment="firefox-pixman-32bit less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104716" comment="firefox-pixman less than 0.16.0-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104717" comment="mozilla-nspr-32bit less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104718" comment="mozilla-nspr-devel less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104719" comment="mozilla-nspr less than 4.10.4-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104720" comment="mozilla-nss-32bit less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104721" comment="mozilla-nss-devel less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104722" comment="mozilla-nss-tools less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104723" comment="mozilla-nss less than 3.16-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104724" comment="mozilla-xulrunner191-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104725" comment="mozilla-xulrunner191-gnomevfs-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104726" comment="mozilla-xulrunner191-gnomevfs less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104727" comment="mozilla-xulrunner191-translations-32bit less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104728" comment="mozilla-xulrunner191-translations less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104729" comment="mozilla-xulrunner191 less than 1.9.1.19-0.13.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104730" comment="mozilla-xulrunner192-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104731" comment="mozilla-xulrunner192-gnome-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104732" comment="mozilla-xulrunner192-gnome less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104733" comment="mozilla-xulrunner192-translations-32bit less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104734" comment="mozilla-xulrunner192-translations less than 1.9.2.28-0.13.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104735" comment="mozilla-xulrunner192 less than 1.9.2.28-0.13.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1533</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1533" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1533" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91a1e0a03ad4b5f6ea664f01e0ac78d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
	<!-- bbcc06aa0b93e2453183b7b5b8bcc0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f0a739569a9d79d0a6467c5ca4d74942 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f283bba17813ec06fdb9ae4ef42aeeae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1534</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1534" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1534" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 30.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91a1e0a03ad4b5f6ea664f01e0ac78d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
	<!-- bbcc06aa0b93e2453183b7b5b8bcc0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f0a739569a9d79d0a6467c5ca4d74942 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f283bba17813ec06fdb9ae4ef42aeeae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1536</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1536" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1536" source="CVE"/>
	<description>
	The PropertyProvider::FindJustificationRange function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91a1e0a03ad4b5f6ea664f01e0ac78d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
	<!-- bbcc06aa0b93e2453183b7b5b8bcc0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f0a739569a9d79d0a6467c5ca4d74942 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f283bba17813ec06fdb9ae4ef42aeeae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1537</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1537" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1537" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozilla::dom::workers::WorkerPrivateParent function in Mozilla Firefox before 30.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91a1e0a03ad4b5f6ea664f01e0ac78d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
	<!-- bbcc06aa0b93e2453183b7b5b8bcc0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f0a739569a9d79d0a6467c5ca4d74942 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f283bba17813ec06fdb9ae4ef42aeeae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1538</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1538" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1538" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsTextEditRules::CreateMozBR function in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via unspecified vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91a1e0a03ad4b5f6ea664f01e0ac78d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
	<!-- bbcc06aa0b93e2453183b7b5b8bcc0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f0a739569a9d79d0a6467c5ca4d74942 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f283bba17813ec06fdb9ae4ef42aeeae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1541</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1541" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1541" source="CVE"/>
	<description>
	Use-after-free vulnerability in the RefreshDriverTimer::TickDriver function in the SMIL Animation Controller in Mozilla Firefox before 30.0, Firefox ESR 24.x before 24.6, and Thunderbird before 24.6 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted web content.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91a1e0a03ad4b5f6ea664f01e0ac78d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
	<!-- bbcc06aa0b93e2453183b7b5b8bcc0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f0a739569a9d79d0a6467c5ca4d74942 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f283bba17813ec06fdb9ae4ef42aeeae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1544</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1544" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1544" source="CVE"/>
	<description>
	Use-after-free vulnerability in the CERT_DestroyCertificate function in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, allows remote attackers to execute arbitrary code via vectors that trigger certain improper removal of an NSSCertificate structure from a trust domain.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1545</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1545" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1545" source="CVE"/>
	<description>
	Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write) via vectors involving the sprintf and console functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 91a1e0a03ad4b5f6ea664f01e0ac78d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
	<!-- bbcc06aa0b93e2453183b7b5b8bcc0ee -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f0a739569a9d79d0a6467c5ca4d74942 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104691" comment="MozillaFirefox-branding-SLED less than 24-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104945" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104946" comment="MozillaFirefox less than 24.6.0esr-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104947" comment="mozilla-nspr-32bit less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104948" comment="mozilla-nspr-devel less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104949" comment="mozilla-nspr less than 4.10.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104950" comment="mozilla-nss-32bit less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104951" comment="mozilla-nss-devel less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104952" comment="mozilla-nss-tools less than 3.16.1-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104953" comment="mozilla-nss less than 3.16.1-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f283bba17813ec06fdb9ae4ef42aeeae -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104935" comment="MozillaFirefox-branding-SLED less than 24-0.12.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104936" comment="MozillaFirefox-translations less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104937" comment="MozillaFirefox less than 24.6.0esr-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104938" comment="mozilla-nspr-32bit less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104939" comment="mozilla-nspr-devel less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104940" comment="mozilla-nspr less than 4.10.6-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104941" comment="mozilla-nss-32bit less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104942" comment="mozilla-nss-devel less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104943" comment="mozilla-nss-tools less than 3.16.1-0.5.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104944" comment="mozilla-nss less than 3.16.1-0.5.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1547" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1548</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1548" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1549" source="CVE"/>
	<description>
	The mozilla::dom::AudioBufferSourceNodeEngine::CopyFromInputBuffer function in Mozilla Firefox before 31.0 and Thunderbird before 31.0 does not properly allocate Web Audio buffer memory, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via crafted audio content that is improperly handled during playback buffering.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1550" source="CVE"/>
	<description>
	Use-after-free vulnerability in the MediaInputPort class in Mozilla Firefox before 31.0 and Thunderbird before 31.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging incorrect Web Audio control-message ordering.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1551" source="CVE"/>
	<description>
	Use-after-free vulnerability in the FontTableRec destructor in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 on Windows allows remote attackers to execute arbitrary code via crafted use of fonts in MathML content, leading to improper handling of a DirectWrite font-face object.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1552</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1552" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1552" source="CVE"/>
	<description>
	Mozilla Firefox before 31.0 and Thunderbird before 31.0 do not properly implement the sandbox attribute of the IFRAME element, which allows remote attackers to bypass intended restrictions on same-origin content via a crafted web site in conjunction with a redirect.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1555" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsDocLoader::OnProgress function in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allows remote attackers to execute arbitrary code via vectors that trigger a FireOnStateChange event.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1556</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1556" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1556" source="CVE"/>
	<description>
	Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7 allow remote attackers to execute arbitrary code via crafted WebGL content constructed with the Cesium JavaScript library.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1557</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1557" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1557" source="CVE"/>
	<description>
	The ConvolveHorizontally function in Skia, as used in Mozilla Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird before 24.7, does not properly handle the discarding of image data during function execution, which allows remote attackers to execute arbitrary code by triggering prolonged image scaling, as demonstrated by scaling of a high-quality image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1558</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1558" source="CVE"/>
	<description>
	Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1559.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1559</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1559" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1559" source="CVE"/>
	<description>
	Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use UTF-8 character encoding in a required context, a different vulnerability than CVE-2014-1558.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1560</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1560" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1560" source="CVE"/>
	<description>
	Mozilla Firefox before 31.0 and Thunderbird before 31.0 allow remote attackers to cause a denial of service (X.509 certificate parsing outage) via a crafted certificate that does not use ASCII character encoding in a required context.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1561</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1561" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1561" source="CVE"/>
	<description>
	Mozilla Firefox before 31.0 does not properly restrict use of drag-and-drop events to spoof customization events, which allows remote attackers to alter the placement of UI icons via crafted JavaScript code that is encountered during (1) page, (2) panel, or (3) toolbar customization.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- aeabea2b6efdbb9fcccb116e66006d7c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
	<!-- f2f8ae117761a6715e1f6766fd35660f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104954" comment="MozillaFirefox-translations less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104955" comment="MozillaFirefox less than 24.7.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104956" comment="mozilla-nss-32bit less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104957" comment="mozilla-nss-devel less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104958" comment="mozilla-nss-tools less than 3.16.2-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104959" comment="mozilla-nss less than 3.16.2-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141562" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1562</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1562" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1562" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24d0f20857a99b68fbd08945af76c27a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104960" comment="MozillaFirefox-translations less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104961" comment="MozillaFirefox less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104962" comment="firefox-gtk2-32bit less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104963" comment="firefox-gtk2-lang less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104964" comment="firefox-gtk2 less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104965" comment="mozilla-nspr-32bit less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104966" comment="mozilla-nspr-devel less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104967" comment="mozilla-nspr less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104968" comment="mozilla-nss-32bit less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104969" comment="mozilla-nss-devel less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104970" comment="mozilla-nss-tools less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104971" comment="mozilla-nss less than 3.16.4-0.5.2"/>
		</criteria>
	</criteria>
	<!-- 401ac4583a90138bdc8c41d347a7be85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104960" comment="MozillaFirefox-translations less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104961" comment="MozillaFirefox less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104962" comment="firefox-gtk2-32bit less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104963" comment="firefox-gtk2-lang less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104964" comment="firefox-gtk2 less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104965" comment="mozilla-nspr-32bit less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104966" comment="mozilla-nspr-devel less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104967" comment="mozilla-nspr less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104968" comment="mozilla-nss-32bit less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104969" comment="mozilla-nss-devel less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104970" comment="mozilla-nss-tools less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104971" comment="mozilla-nss less than 3.16.4-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1567</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1567" source="CVE"/>
	<description>
	Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 32.0, Firefox ESR 24.x before 24.8 and 31.x before 31.1, and Thunderbird 24.x before 24.8 and 31.x before 31.1 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 24d0f20857a99b68fbd08945af76c27a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104960" comment="MozillaFirefox-translations less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104961" comment="MozillaFirefox less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104962" comment="firefox-gtk2-32bit less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104963" comment="firefox-gtk2-lang less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104964" comment="firefox-gtk2 less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104965" comment="mozilla-nspr-32bit less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104966" comment="mozilla-nspr-devel less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104967" comment="mozilla-nspr less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104968" comment="mozilla-nss-32bit less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104969" comment="mozilla-nss-devel less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104970" comment="mozilla-nss-tools less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104971" comment="mozilla-nss less than 3.16.4-0.5.2"/>
		</criteria>
	</criteria>
	<!-- 401ac4583a90138bdc8c41d347a7be85 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104960" comment="MozillaFirefox-translations less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104961" comment="MozillaFirefox less than 24.8.0esr-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104962" comment="firefox-gtk2-32bit less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104963" comment="firefox-gtk2-lang less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104964" comment="firefox-gtk2 less than 2.18.9-0.11.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104965" comment="mozilla-nspr-32bit less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104966" comment="mozilla-nspr-devel less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104967" comment="mozilla-nspr less than 4.10.7-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104968" comment="mozilla-nss-32bit less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104969" comment="mozilla-nss-devel less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104970" comment="mozilla-nss-tools less than 3.16.4-0.5.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104971" comment="mozilla-nss less than 3.16.4-0.5.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1568</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1568" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1e00d26644326f6d8943bad777904cab -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104972" comment="mozilla-nss-32bit less than 3.16.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104973" comment="mozilla-nss-devel less than 3.16.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104974" comment="mozilla-nss-tools less than 3.16.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104975" comment="mozilla-nss less than 3.16.5-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 2ee24d8f2ff89770e348b8257c89f70f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104972" comment="mozilla-nss-32bit less than 3.16.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104973" comment="mozilla-nss-devel less than 3.16.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104974" comment="mozilla-nss-tools less than 3.16.5-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104975" comment="mozilla-nss less than 3.16.5-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1569</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1569" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1569" source="CVE"/>
	<description>
	The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1574</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1574" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1574" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1575</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1575" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 33.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to improper interaction between threading and garbage collection in the GCRuntime::triggerGC function in js/src/jsgc.cpp, and unknown other vectors.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1576</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1576" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1576" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nsTransformedTextRun function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via Cascading Style Sheets (CSS) token sequences that trigger changes to capitalization style.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1577</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1577" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1577" source="CVE"/>
	<description>
	The mozilla::dom::OscillatorNodeEngine::ComputeCustom function in the Web Audio subsystem in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read, memory corruption, and application crash) via an invalid custom waveform that triggers a calculation of a negative frequency value.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141578" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1578</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1578" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1578" source="CVE"/>
	<description>
	The get_tile function in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly execute arbitrary code via WebM frames with invalid tile sizes that are improperly handled in buffering operations during video playback.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1581</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1581" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1581" source="CVE"/>
	<description>
	Use-after-free vulnerability in DirectionalityUtils.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 allows remote attackers to execute arbitrary code via text that is improperly handled during the interaction between directionality resolution and layout.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1583</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1583" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1583" source="CVE"/>
	<description>
	The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1585</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1585" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1585" source="CVE"/>
	<description>
	The WebRTC video-sharing feature in dom/media/MediaManager.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not properly recognize Stop Sharing actions for videos in IFRAME elements, which allows remote attackers to obtain sensitive information from the local camera by maintaining a session after the user tries to discontinue streaming.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1586</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1586" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1586" source="CVE"/>
	<description>
	content/base/src/nsDocument.cpp in Mozilla Firefox before 33.0, Firefox ESR 31.x before 31.2, and Thunderbird 31.x before 31.2 does not consider whether WebRTC video sharing is occurring, which allows remote attackers to obtain sensitive information from the local camera in certain IFRAME situations by maintaining a session after the user temporarily navigates away.
	</description>
 </metadata>
<!-- caf12701f26397664ab064794563a9cc -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104976" comment="MozillaFirefox-branding-SLED less than 31.0-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104977" comment="MozillaFirefox-translations less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104978" comment="MozillaFirefox less than 31.2.0esr-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104979" comment="mozilla-nspr-32bit less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104980" comment="mozilla-nspr-devel less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104981" comment="mozilla-nspr less than 4.10.7-0.5.4"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104982" comment="mozilla-nss-32bit less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104983" comment="mozilla-nss-devel less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104984" comment="mozilla-nss-tools less than 3.17.2-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104985" comment="mozilla-nss less than 3.17.2-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1587</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1587" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1587" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1588</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1588" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1588" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 34.0 and SeaMonkey before 2.31 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1589</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1589" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1589" source="CVE"/>
	<description>
	Mozilla Firefox before 34.0 and SeaMonkey before 2.31 provide stylesheets with an incorrect primary namespace, which allows remote attackers to bypass intended access restrictions via an XBL binding.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1590</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1590" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1590" source="CVE"/>
	<description>
	The XMLHttpRequest.prototype.send method in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to cause a denial of service (application crash) via a crafted JavaScript object.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1591</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1591" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1591" source="CVE"/>
	<description>
	Mozilla Firefox 33.0 and SeaMonkey before 2.31 include path strings in CSP violation reports, which allows remote attackers to obtain sensitive information via a web site that receives a report after a redirect.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141592" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1592</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1592" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1592" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsHtml5TreeOperation function in xul.dll in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code by adding a second root element to an HTML5 document during parsing.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1593</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1593" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1593" source="CVE"/>
	<description>
	Stack-based buffer overflow in the mozilla::FileBlockCache::Read function in Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 allows remote attackers to execute arbitrary code via crafted media content.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1594</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1594" source="CVE"/>
	<description>
	Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, Thunderbird before 31.3, and SeaMonkey before 2.31 might allow remote attackers to execute arbitrary code by leveraging an incorrect cast from the BasicThebesLayer data type to the BasicContainerLayer data type.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1595</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1595" source="CVE"/>
	<description>
	Mozilla Firefox before 34.0, Firefox ESR 31.x before 31.3, and Thunderbird before 31.3 on Apple OS X 10.10 omit a CoreGraphics disable-logging action that is needed by jemalloc-based applications, which allows local users to obtain sensitive information by reading /tmp files, as demonstrated by credential information.
	</description>
 </metadata>
<!-- d622a076d6545627a78da4f5c5eb804c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009104986" comment="MozillaFirefox-translations less than 31.3.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104987" comment="MozillaFirefox less than 31.3.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141737" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1737</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1737" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1737" source="CVE"/>
	<description>
	The raw_cmd_copyin function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly handle error conditions during processing of an FDRAWCMD ioctl call, which allows local users to trigger kfree operations and gain privileges by leveraging write access to a /dev/fd device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 00bbe32fc40478b12864bce2c72e300b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104873" comment="kernel-bigsmp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104877" comment="kernel-kdumppae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104881" comment="kernel-vmi less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104882" comment="kernel-vmipae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104884" comment="kernel-xenpae less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 92e5a7d9af3ca4f050703bcbf2268c9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- a9f7b560616d678d5217f211234abdba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1738</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1738" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1738" source="CVE"/>
	<description>
	The raw_cmd_copyout function in drivers/block/floppy.c in the Linux kernel through 3.14.3 does not properly restrict access to certain pointers during processing of an FDRAWCMD ioctl call, which allows local users to obtain sensitive information from kernel heap memory by leveraging write access to a /dev/fd device.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 00bbe32fc40478b12864bce2c72e300b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104873" comment="kernel-bigsmp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104877" comment="kernel-kdumppae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104881" comment="kernel-vmi less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104882" comment="kernel-vmipae less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104884" comment="kernel-xenpae less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 17ddf66eae63aab3af8b2b3bec742669 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104657" comment="kernel-bigsmp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104661" comment="kernel-kdumppae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104665" comment="kernel-vmi less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104666" comment="kernel-vmipae less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104668" comment="kernel-xenpae less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 26314f5d51311e1fdece27b8fcdf804a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- 92e5a7d9af3ca4f050703bcbf2268c9e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
	<!-- 9914353b490102922bc3d08bdf30bacc -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104658" comment="kernel-debug less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104659" comment="kernel-default less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104660" comment="kernel-kdump less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104662" comment="kernel-smp less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104663" comment="kernel-source less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104664" comment="kernel-syms less than 2.6.16.60-0.123.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104667" comment="kernel-xen less than 2.6.16.60-0.123.1"/>
		</criteria>
	</criteria>
	<!-- a9f7b560616d678d5217f211234abdba -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104874" comment="kernel-debug less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104875" comment="kernel-default less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104876" comment="kernel-kdump less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104878" comment="kernel-smp less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104879" comment="kernel-source less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104880" comment="kernel-syms less than 2.6.16.60-0.107.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104883" comment="kernel-xen less than 2.6.16.60-0.107.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1874</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1874" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1874" source="CVE"/>
	<description>
	The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20141876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-1876</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-1876" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1876" source="CVE"/>
	<description>
	The unpacker::redirect_stdio function in unpack.cpp in unpack200 in OpenJDK 6, 7, and 8; Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JRockit R27.8.1 and R28.3.1; and Java SE Embedded 7u51 does not securely create temporary files when a log file cannot be opened, which allows local users to overwrite arbitrary files via a symlink attack on /tmp/unpack.log.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2338</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2338" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2338" source="CVE"/>
	<description>
	IKEv2 in strongSwan 4.0.7 before 5.1.3 allows remote attackers to bypass authentication by rekeying an IKE_SA during (1) initiation or (2) re-authentication, which triggers the IKE_SA state to be set to established.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6934f5428f28e943d4b95fb80186e500 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104988" comment="strongswan-doc less than 4.4.0-6.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104989" comment="strongswan less than 4.4.0-6.17.1"/>
		</criteria>
	</criteria>
	<!-- bf28f278dcbe157650c32cbc4472be03 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104990" comment="strongswan-doc less than 4.1.10-0.20.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104991" comment="strongswan less than 4.1.10-0.20.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142398" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2398</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2398" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2398" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and JRockit R27.8.1 and R28.3.1 allows remote authenticated users to affect integrity via unknown vectors related to Javadoc.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2401</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2401" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2401" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2409</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2409" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2409" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2412</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2412" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2412" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, SE 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT, a different vulnerability than CVE-2014-0451.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2414</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2414" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2414" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAXB.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2420" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2421</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2421" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2421" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8; JavaFX 2.2.51; and Java SE Embedded 7u51 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2423</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2423" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2423" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JAX-WS, a different vulnerability than CVE-2014-0452 and CVE-2014-0458.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2427</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2427" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u61, 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 29c5cf97cb2a3ebfac90cfacae2c711e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104886" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104887" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104888" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104889" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104890" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104891" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104892" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104893" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.6-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104894" comment="java-1_5_0-ibm less than 1.5.0_sr16.6-0.5.1"/>
		</criteria>
	</criteria>
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2428</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-2428" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2428" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u71, 7u51, and 8, and Java SE Embedded 7u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8737d63fc5fbcb05aaf87bdb3c7840f5 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104895" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104896" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104897" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104898" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104899" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104900" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104901" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104902" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104903" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104904" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.8.1"/>
		</criteria>
	</criteria>
	<!-- ae92cd41800301a5a62df344f420d99d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104905" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104906" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104907" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104908" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104909" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104910" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104911" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104912" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104913" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.0-0.5.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104914" comment="java-1_6_0-ibm less than 1.6.0_sr16.0-0.5.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-2497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2497" source="CVE"/>
	<description>
	The gdImageCreateFromXpm function in gdxpm.c in libgd, as used in PHP 5.4.26 and earlier, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an XPM file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3eaed290beadcf7a262e364bfa245f7a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
	<!-- c644113f641b16b9a35807029c904216 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20142891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-2891</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-2891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2891" source="CVE"/>
	<description>
	strongSwan before 5.1.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a crafted ID_DER_ASN1_DN ID payload.
	</description>
 </metadata>
<!-- 98e26dc2a1696d47c59ab9aa31ce0c35 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009111116" comment="strongswan-doc less than 4.4.0-6.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009111117" comment="strongswan less than 4.4.0-6.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3065</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3065" source="CVE"/>
	<description>
	Unspecified vulnerability in IBM Java Runtime Environment (JRE) 7 R1 before SR2 (7.1.2.0), 7 before SR8 (7.0.8.0), 6 R1 before SR8 FP2 (6.1.8.2), 6 before SR16 FP2 (6.0.16.2), and before SR16 FP8 (5.0.16.8) allows local users to execute arbitrary code via vectors related to the shared classes cache.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3184</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3184" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3184" source="CVE"/>
	<description>
	The report_fixup functions in the HID subsystem in the Linux kernel before 3.16.2 might allow physically proximate attackers to cause a denial of service (out-of-bounds write) via a crafted device that provides a small report descriptor, related to (1) drivers/hid/hid-cherry.c, (2) drivers/hid/hid-kye.c, (3) drivers/hid/hid-lg.c, (4) drivers/hid/hid-monterey.c, (5) drivers/hid/hid-petalynx.c, and (6) drivers/hid/hid-sunplus.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3185</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3185" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3185" source="CVE"/>
	<description>
	Multiple buffer overflows in the command_port_read_callback function in drivers/usb/serial/whiteheat.c in the Whiteheat USB Serial Driver in the Linux kernel before 3.16.2 allow physically proximate attackers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via a crafted device that provides a large amount of (1) EHCI or (2) XHCI data associated with a bulk response.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3466</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466" source="CVE"/>
	<description>
	Buffer overflow in the read_server_hello function in lib/gnutls_handshake.c in GnuTLS before 3.1.25, 3.2.x before 3.2.15, and 3.3.x before 3.3.4 allows remote servers to cause a denial of service (memory corruption) or possibly execute arbitrary code via a long session id in a ServerHello message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a664138948d527c37403de9fef272df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
	<!-- ce2995d7d37c598d89a8e91d407bb481 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3467</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3467" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the DER decoder in GNU Libtasn1 before 3.6, as used in GnuTLS, allow remote attackers to cause a denial of service (out-of-bounds read) via crafted ASN.1 data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a664138948d527c37403de9fef272df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
	<!-- ce2995d7d37c598d89a8e91d407bb481 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3468</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3468" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468" source="CVE"/>
	<description>
	The asn1_get_bit_der function in GNU Libtasn1 before 3.6 does not properly report an error when a negative bit length is identified, which allows context-dependent attackers to cause out-of-bounds access via crafted ASN.1 data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a664138948d527c37403de9fef272df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
	<!-- ce2995d7d37c598d89a8e91d407bb481 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3469</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469" source="CVE"/>
	<description>
	The (1) asn1_read_value_type and (2) asn1_read_value functions in GNU Libtasn1 before 3.6 allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via a NULL value in an ivalue argument.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3a664138948d527c37403de9fef272df -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
	<!-- ce2995d7d37c598d89a8e91d407bb481 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104992" comment="gnutls-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104993" comment="gnutls-devel-32bit less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104994" comment="gnutls-devel less than 1.2.10-13.40.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104995" comment="gnutls less than 1.2.10-13.40.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3470</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3470" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470" source="CVE"/>
	<description>
	The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when an anonymous ECDH cipher suite is used, allows remote attackers to cause a denial of service (NULL pointer dereference and client crash) by triggering a NULL certificate value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 06090ed98c412d84909da7f988402089 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104925" comment="openssl-32bit less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104926" comment="openssl-devel-32bit less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104927" comment="openssl-devel less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104928" comment="openssl-doc less than 0.9.8a-18.45.77.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104929" comment="openssl less than 0.9.8a-18.45.77.1"/>
		</criteria>
	</criteria>
	<!-- ae77e66ba2a03bee961e56bc2d1daee6 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104930" comment="openssl-32bit less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104931" comment="openssl-devel-32bit less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104932" comment="openssl-devel less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104933" comment="openssl-doc less than 0.9.8a-18.82.4"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104934" comment="openssl less than 0.9.8a-18.82.4"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3505</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3505" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3505" source="CVE"/>
	<description>
	Double free vulnerability in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (application crash) via crafted DTLS packets that trigger an error condition.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9b67b5e9df54ba01bdf516a4768dfc90 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104996" comment="openssl-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104997" comment="openssl-devel-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104998" comment="openssl-devel less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104999" comment="openssl-doc less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105000" comment="openssl less than 0.9.8a-18.84.5"/>
		</criteria>
	</criteria>
	<!-- a13af464a610cda0eae18606907ad3af -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105001" comment="openssl-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105002" comment="openssl-devel-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105003" comment="openssl-devel less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105004" comment="openssl-doc less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105005" comment="openssl less than 0.9.8a-18.45.79.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3506</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3506" source="CVE"/>
	<description>
	d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via crafted DTLS handshake messages that trigger memory allocations corresponding to large length values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9b67b5e9df54ba01bdf516a4768dfc90 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104996" comment="openssl-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104997" comment="openssl-devel-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104998" comment="openssl-devel less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104999" comment="openssl-doc less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105000" comment="openssl less than 0.9.8a-18.84.5"/>
		</criteria>
	</criteria>
	<!-- a13af464a610cda0eae18606907ad3af -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105001" comment="openssl-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105002" comment="openssl-devel-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105003" comment="openssl-devel less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105004" comment="openssl-doc less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105005" comment="openssl less than 0.9.8a-18.45.79.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3507</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3507" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3507" source="CVE"/>
	<description>
	Memory leak in d1_both.c in the DTLS implementation in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote attackers to cause a denial of service (memory consumption) via zero-length DTLS fragments that trigger improper handling of the return value of a certain insert function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9b67b5e9df54ba01bdf516a4768dfc90 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104996" comment="openssl-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104997" comment="openssl-devel-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104998" comment="openssl-devel less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104999" comment="openssl-doc less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105000" comment="openssl less than 0.9.8a-18.84.5"/>
		</criteria>
	</criteria>
	<!-- a13af464a610cda0eae18606907ad3af -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105001" comment="openssl-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105002" comment="openssl-devel-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105003" comment="openssl-devel less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105004" comment="openssl-doc less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105005" comment="openssl less than 0.9.8a-18.45.79.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3508</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3508" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3508" source="CVE"/>
	<description>
	The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allows context-dependent attackers to obtain sensitive information from process stack memory by reading output from X509_name_oneline, X509_name_print_ex, and unspecified other functions.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9b67b5e9df54ba01bdf516a4768dfc90 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104996" comment="openssl-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104997" comment="openssl-devel-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104998" comment="openssl-devel less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104999" comment="openssl-doc less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105000" comment="openssl less than 0.9.8a-18.84.5"/>
		</criteria>
	</criteria>
	<!-- a13af464a610cda0eae18606907ad3af -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105001" comment="openssl-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105002" comment="openssl-devel-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105003" comment="openssl-devel less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105004" comment="openssl-doc less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105005" comment="openssl less than 0.9.8a-18.45.79.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3510</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3510" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3510" source="CVE"/>
	<description>
	The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i allows remote DTLS servers to cause a denial of service (NULL pointer dereference and client application crash) via a crafted handshake message in conjunction with a (1) anonymous DH or (2) anonymous ECDH ciphersuite.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 9b67b5e9df54ba01bdf516a4768dfc90 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104996" comment="openssl-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104997" comment="openssl-devel-32bit less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104998" comment="openssl-devel less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104999" comment="openssl-doc less than 0.9.8a-18.84.5"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105000" comment="openssl less than 0.9.8a-18.84.5"/>
		</criteria>
	</criteria>
	<!-- a13af464a610cda0eae18606907ad3af -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105001" comment="openssl-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105002" comment="openssl-devel-32bit less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105003" comment="openssl-devel less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105004" comment="openssl-doc less than 0.9.8a-18.45.79.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105005" comment="openssl less than 0.9.8a-18.45.79.3"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3566</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3566" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3566" source="CVE"/>
	<description>
	The SSL protocol 3.0, as used in OpenSSL through 1.0.1i and other products, uses nondeterministic CBC padding, which makes it easier for man-in-the-middle attackers to obtain cleartext data via a padding-oracle attack, aka the "POODLE" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1960c50f351e883d9bffe5194436ac38 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105006" comment="openssl-32bit less than 0.9.8a-18.86.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105007" comment="openssl-devel-32bit less than 0.9.8a-18.86.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105008" comment="openssl-devel less than 0.9.8a-18.86.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105009" comment="openssl-doc less than 0.9.8a-18.86.3"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105010" comment="openssl less than 0.9.8a-18.86.3"/>
		</criteria>
	</criteria>
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143567" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3567</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-3567" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3567" source="CVE"/>
	<description>
	Memory leak in the tls_decrypt_ticket function in t1_lib.c in OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j allows remote attackers to cause a denial of service (memory consumption) via a crafted session ticket that triggers an integrity-check failure.
	</description>
 </metadata>
<!-- 1960c50f351e883d9bffe5194436ac38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105006" comment="openssl-32bit less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105007" comment="openssl-devel-32bit less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105008" comment="openssl-devel less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105009" comment="openssl-doc less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105010" comment="openssl less than 0.9.8a-18.86.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3568</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3568" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3568" source="CVE"/>
	<description>
	OpenSSL before 0.9.8zc, 1.0.0 before 1.0.0o, and 1.0.1 before 1.0.1j does not properly enforce the no-ssl3 build option, which allows remote attackers to bypass intended access restrictions via an SSL 3.0 handshake, related to s23_clnt.c and s23_srvr.c.
	</description>
 </metadata>
<!-- 1960c50f351e883d9bffe5194436ac38 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105006" comment="openssl-32bit less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105007" comment="openssl-devel-32bit less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105008" comment="openssl-devel less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105009" comment="openssl-doc less than 0.9.8a-18.86.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105010" comment="openssl less than 0.9.8a-18.86.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3570</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3570" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3570" source="CVE"/>
	<description>
	The BN_sqr implementation in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not properly calculate the square of a BIGNUM value, which might make it easier for remote attackers to defeat cryptographic protection mechanisms via unspecified vectors, related to crypto/bn/asm/mips.pl, crypto/bn/asm/x86_64-gcc.c, and crypto/bn/bn_asm.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8844db5d02df9a7c82d92c1036debbe3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105673" comment="compat-openssl097g-32bit less than 0.9.7g-13.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105674" comment="compat-openssl097g less than 0.9.7g-13.27.1"/>
		</criteria>
	</criteria>
	<!-- fa132e4f1eada61e2e68b052e1d2fb3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105652" comment="openssl-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105653" comment="openssl-devel-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105654" comment="openssl-devel less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105655" comment="openssl-doc less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105656" comment="openssl less than 0.9.8a-18.88.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3571</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3571" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3571" source="CVE"/>
	<description>
	OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted DTLS message that is processed with a different read operation for the handshake header than for the handshake body, related to the dtls1_get_record function in d1_pkt.c and the ssl3_read_n function in s3_pkt.c.
	</description>
 </metadata>
<!-- fa132e4f1eada61e2e68b052e1d2fb3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105652" comment="openssl-32bit less than 0.9.8a-18.88.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105653" comment="openssl-devel-32bit less than 0.9.8a-18.88.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105654" comment="openssl-devel less than 0.9.8a-18.88.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105655" comment="openssl-doc less than 0.9.8a-18.88.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105656" comment="openssl less than 0.9.8a-18.88.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3572</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3572" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3572" source="CVE"/>
	<description>
	The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct ECDHE-to-ECDH downgrade attacks and trigger a loss of forward secrecy by omitting the ServerKeyExchange message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8844db5d02df9a7c82d92c1036debbe3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105673" comment="compat-openssl097g-32bit less than 0.9.7g-13.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105674" comment="compat-openssl097g less than 0.9.7g-13.27.1"/>
		</criteria>
	</criteria>
	<!-- fa132e4f1eada61e2e68b052e1d2fb3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105652" comment="openssl-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105653" comment="openssl-devel-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105654" comment="openssl-devel less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105655" comment="openssl-doc less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105656" comment="openssl less than 0.9.8a-18.88.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3615</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-3615" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3615" source="CVE"/>
	<description>
	The VGA emulator in QEMU allows local guest users to read host memory by setting the display to a high resolution.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3673</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3673" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3673" source="CVE"/>
	<description>
	The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20143917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-3917</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-3917" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3917" source="CVE"/>
	<description>
	kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4021</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4021" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4021" source="CVE"/>
	<description>
	Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
	</description>
 </metadata>
<!-- 2430903f7edca75f2ff542e854abf451 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105011" comment="xen-devel less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105012" comment="xen-doc-html less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105013" comment="xen-doc-pdf less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105014" comment="xen-doc-ps less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105015" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105016" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105017" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105018" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105019" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105020" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105021" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105022" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105023" comment="xen-libs-32bit less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105024" comment="xen-libs less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105025" comment="xen-tools-domU less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105026" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105027" comment="xen-tools less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105028" comment="xen less than 3.2.3_17040_46-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4043</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4043" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4043" source="CVE"/>
	<description>
	The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 190862be14e3ed91b361e0b0a66e292a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
		</criteria>
	</criteria>
	<!-- 1ccbe69cba5cc8835258525263c85657 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105614" comment="glibc-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105615" comment="glibc-devel-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105616" comment="glibc-devel less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105617" comment="glibc-html less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105618" comment="glibc-i18ndata less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105619" comment="glibc-info less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105620" comment="glibc-locale-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105621" comment="glibc-locale less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105622" comment="glibc-profile-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105623" comment="glibc-profile less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105624" comment="glibc less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105625" comment="nscd less than 2.4-31.115.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4049</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4049" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4049" source="CVE"/>
	<description>
	Heap-based buffer overflow in the php_parserr function in ext/standard/dns.c in PHP 5.6.0beta4 and earlier allows remote servers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted DNS TXT record, related to the dns_get_record function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3eaed290beadcf7a262e364bfa245f7a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
	<!-- c644113f641b16b9a35807029c904216 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104793" comment="apache2-mod_php5 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104794" comment="php5-bcmath less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104795" comment="php5-bz2 less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104796" comment="php5-calendar less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104797" comment="php5-ctype less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104798" comment="php5-curl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104799" comment="php5-dba less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104800" comment="php5-dbase less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104801" comment="php5-devel less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104802" comment="php5-dom less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104803" comment="php5-exif less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104804" comment="php5-fastcgi less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104805" comment="php5-ftp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104806" comment="php5-gd less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104807" comment="php5-gettext less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104808" comment="php5-gmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104809" comment="php5-hash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104810" comment="php5-iconv less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104811" comment="php5-imap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104812" comment="php5-json less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104813" comment="php5-ldap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104814" comment="php5-mbstring less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104815" comment="php5-mcrypt less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104816" comment="php5-mhash less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104817" comment="php5-mysql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104818" comment="php5-ncurses less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104819" comment="php5-odbc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104820" comment="php5-openssl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104821" comment="php5-pcntl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104822" comment="php5-pdo less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104823" comment="php5-pear less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104824" comment="php5-pgsql less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104825" comment="php5-posix less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104826" comment="php5-pspell less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104827" comment="php5-shmop less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104828" comment="php5-snmp less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104829" comment="php5-soap less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104830" comment="php5-sockets less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104831" comment="php5-sqlite less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104832" comment="php5-suhosin less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104833" comment="php5-sysvmsg less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104834" comment="php5-sysvsem less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104835" comment="php5-sysvshm less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104836" comment="php5-tokenizer less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104837" comment="php5-wddx less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104838" comment="php5-xmlreader less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104839" comment="php5-xmlrpc less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104840" comment="php5-xsl less than 5.2.14-0.48.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104841" comment="php5-zlib less than 5.2.14-0.48.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4209</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4209" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX.
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4218</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4218" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4218" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect integrity via unknown vectors related to Libraries.
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4219</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4219" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4219" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot.
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4244</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4244" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4244" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and JRockit R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Security.
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4252</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4252" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Security.
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4262</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4262" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4262" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4263</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4263" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4263" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5, and JRockit R27.8.2 and R28.3.2, allows remote attackers to affect confidentiality and integrity via unknown vectors related to "Diffie-Hellman key agreement."
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4268</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4268" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4268" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality via unknown vectors related to Swing.
	</description>
 </metadata>
<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4288</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4288" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-6493, CVE-2014-6503, and CVE-2014-6532.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144607" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4607</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4607" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4607" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 53e03c0ab7cec114a28a4a37b4edfa47 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105029" comment="lzo-32bit less than 2.02-12.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105030" comment="lzo-devel-32bit less than 2.02-12.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105031" comment="lzo-devel less than 2.02-12.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105032" comment="lzo less than 2.02-12.10.1"/>
		</criteria>
	</criteria>
	<!-- 8a13db4a6cefecad6461ab5197a5debd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105029" comment="lzo-32bit less than 2.02-12.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105030" comment="lzo-devel-32bit less than 2.02-12.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105031" comment="lzo-devel less than 2.02-12.10.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105032" comment="lzo less than 2.02-12.10.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144652" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4652</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4652" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4652" source="CVE"/>
	<description>
	Race condition in the tlv handler functionality in the snd_ctl_elem_user_tlv function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allows local users to obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4653</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4653" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4653" source="CVE"/>
	<description>
	sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not ensure possession of a read/write lock, which allows local users to cause a denial of service (use-after-free) and obtain sensitive information from kernel memory by leveraging /dev/snd/controlCX access.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4654</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4654" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4654" source="CVE"/>
	<description>
	The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not check authorization for SNDRV_CTL_IOCTL_ELEM_REPLACE commands, which allows local users to remove kernel controls and cause a denial of service (use-after-free and system crash) by leveraging /dev/snd/controlCX access for an ioctl call.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144655" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4655</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4655" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4655" source="CVE"/>
	<description>
	The snd_ctl_elem_add function in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 does not properly maintain the user_ctl_count value, which allows local users to cause a denial of service (integer overflow and limit bypass) by leveraging /dev/snd/controlCX access for a large number of SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl calls.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4656</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4656" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4656" source="CVE"/>
	<description>
	Multiple integer overflows in sound/core/control.c in the ALSA control implementation in the Linux kernel before 3.15.2 allow local users to cause a denial of service by leveraging /dev/snd/controlCX access, related to (1) index values in the snd_ctl_add function and (2) numid values in the snd_ctl_remove_numid_conflict function.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144667" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4667</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4667" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4667" source="CVE"/>
	<description>
	The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20144877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-4877</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-4877" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-4877" source="CVE"/>
	<description>
	Absolute path traversal vulnerability in GNU Wget before 1.16, when recursion is enabled, allows remote FTP servers to write to arbitrary files, and consequently execute arbitrary code, via a LIST response that references the same filename within two entries, one of which indicates that the filename is for a symlink.
	</description>
 </metadata>
<!-- c335014fcf83b00f5b1e62db97d8b59c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105033" comment="wget less than 1.10.2-15.14.5"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5119</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-5119" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5119" source="CVE"/>
	<description>
	Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration modules.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 190862be14e3ed91b361e0b0a66e292a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
		</criteria>
	</criteria>
	<!-- 767429925ce018c15cbe14c33d6a0f11 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104592" comment="glibc-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104593" comment="glibc-devel-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104594" comment="glibc-devel less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104595" comment="glibc-html less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104596" comment="glibc-i18ndata less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104597" comment="glibc-info less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104598" comment="glibc-locale-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104599" comment="glibc-locale less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104600" comment="glibc-profile-32bit less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104601" comment="glibc-profile less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104602" comment="glibc less than 2.4-31.111.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104603" comment="nscd less than 2.4-31.111.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5146</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-5146" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5146" source="CVE"/>
	<description>
	Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5149.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5149</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-5149" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5149" source="CVE"/>
	<description>
	Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page assigned to a guest, a different vulnerability than CVE-2014-5146.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5471</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-5471" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5471" source="CVE"/>
	<description>
	Stack consumption vulnerability in the parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (uncontrolled recursion, and system crash or reboot) via a crafted iso9660 image with a CL entry referring to a directory entry that has a CL entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20145472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-5472</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-5472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5472" source="CVE"/>
	<description>
	The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel through 3.16.1 allows local users to cause a denial of service (unkillable mount process) via a crafted iso9660 image with a self-referential CL entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6040</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6040" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6040" source="CVE"/>
	<description>
	GNU C Library (aka glibc) before 2.20 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via a multibyte character value of "0xffff" to the iconv function when converting (1) IBM933, (2) IBM935, (3) IBM937, (4) IBM939, or (5) IBM1364 encoded data to UTF-8.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 190862be14e3ed91b361e0b0a66e292a -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104580" comment="glibc-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104581" comment="glibc-devel-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104582" comment="glibc-devel less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104583" comment="glibc-html less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104584" comment="glibc-i18ndata less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104585" comment="glibc-info less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104586" comment="glibc-locale-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104587" comment="glibc-locale less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104588" comment="glibc-profile-32bit less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104589" comment="glibc-profile less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104590" comment="glibc less than 2.4-31.77.112.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104591" comment="nscd less than 2.4-31.77.112.1"/>
		</criteria>
	</criteria>
	<!-- 1ccbe69cba5cc8835258525263c85657 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105614" comment="glibc-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105615" comment="glibc-devel-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105616" comment="glibc-devel less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105617" comment="glibc-html less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105618" comment="glibc-i18ndata less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105619" comment="glibc-info less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105620" comment="glibc-locale-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105621" comment="glibc-locale less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105622" comment="glibc-profile-32bit less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105623" comment="glibc-profile less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105624" comment="glibc less than 2.4-31.115.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105625" comment="nscd less than 2.4-31.115.2"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6271</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271" source="CVE"/>
	<description>
	GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock."  NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1143502d673561f6e5895393ba93df6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
	<!-- 5aa8890d421145a022bf2205e01b3c68 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104533" comment="bash less than 3.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104534" comment="readline-32bit less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104535" comment="readline-devel-32bit less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104536" comment="readline-devel less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104537" comment="readline less than 5.1-24.32.1"/>
		</criteria>
	</criteria>
	<!-- b6868a6fc575e34338a7d5fd7491f09f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
	<!-- fd9fa24daf4d325c609035f0c778a723 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009104533" comment="bash less than 3.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104534" comment="readline-32bit less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104535" comment="readline-devel-32bit less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104536" comment="readline-devel less than 5.1-24.32.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009104537" comment="readline less than 5.1-24.32.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6277</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6277" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277" source="CVE"/>
	<description>
	GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1143502d673561f6e5895393ba93df6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
	<!-- b6868a6fc575e34338a7d5fd7491f09f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6278</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278" source="CVE"/>
	<description>
	GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1143502d673561f6e5895393ba93df6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
	<!-- b6868a6fc575e34338a7d5fd7491f09f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6457</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6457" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6457" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3, and R28.3.3 allows remote attackers to affect confidentiality and integrity via vectors related to JSSE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6458</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6458" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6466</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6466" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Internet Explorer, allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6492</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6492" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, when running on Firefox, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6493</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6493" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6493" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6503, and CVE-2014-6532.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6502</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6502" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6502" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect integrity via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6503</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6503" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6503" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6532.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6506</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6506" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6511</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6511" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6512</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6512" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6513</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6513" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6515</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6515" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6515" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6531</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6531" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6531" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20, and Java SE Embedded 7u60, allows remote attackers to affect confidentiality via unknown vectors related to Libraries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6532</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6532" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6532" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u81, 7u67, and 8u20 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment, a different vulnerability than CVE-2014-4288, CVE-2014-6493, and CVE-2014-6503.
	</description>
 </metadata>
<!-- a992e300008dd2cf884e0b1fa9206267 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20146558" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-6558</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-6558" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6558" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u71, 6u81, 7u67, and 8u20; Java SE Embedded 7u60; and JRockit R27.8.3 and JRockit R28.3.3 allows remote attackers to affect integrity via unknown vectors related to Security.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7155</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-7155" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7155" source="CVE"/>
	<description>
	The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
	</description>
 </metadata>
<!-- 2430903f7edca75f2ff542e854abf451 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105011" comment="xen-devel less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105012" comment="xen-doc-html less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105013" comment="xen-doc-pdf less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105014" comment="xen-doc-ps less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105015" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105016" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105017" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105018" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105019" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105020" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105021" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105022" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105023" comment="xen-libs-32bit less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105024" comment="xen-libs less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105025" comment="xen-tools-domU less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105026" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105027" comment="xen-tools less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105028" comment="xen less than 3.2.3_17040_46-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7169</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-7169" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169" source="CVE"/>
	<description>
	GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1143502d673561f6e5895393ba93df6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
	<!-- b6868a6fc575e34338a7d5fd7491f09f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7186</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-7186" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186" source="CVE"/>
	<description>
	The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the "redir_stack" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1143502d673561f6e5895393ba93df6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
	<!-- b6868a6fc575e34338a7d5fd7491f09f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7187</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP3 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-7187" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187" source="CVE"/>
	<description>
	Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 1143502d673561f6e5895393ba93df6f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
	<!-- b6868a6fc575e34338a7d5fd7491f09f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp3-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105034" comment="bash less than 3.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105035" comment="readline-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105036" comment="readline-devel-32bit less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105037" comment="readline-devel less than 5.1-24.34.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105038" comment="readline less than 5.1-24.34.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7815</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-7815" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7815" source="CVE"/>
	<description>
	The set_pixel_format function in ui/vnc.c in QEMU allows remote attackers to cause a denial of service (crash) via a small bytes_per_pixel value.
	</description>
 </metadata>
<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20147817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-7817</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-7817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7817" source="CVE"/>
	<description>
	The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".
	</description>
 </metadata>
<!-- ddad3e23b15c5919bf5e29a0fcedc637 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107927" comment="glibc-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107928" comment="glibc-devel-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107929" comment="glibc-devel less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107930" comment="glibc-html less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107931" comment="glibc-i18ndata less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107932" comment="glibc-info less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107933" comment="glibc-locale-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107934" comment="glibc-locale less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107935" comment="glibc-profile-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107936" comment="glibc-profile less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107937" comment="glibc less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107938" comment="nscd less than 2.4-31.117.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8275</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8275" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8275" source="CVE"/>
	<description>
	OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k does not enforce certain constraints on certificate data, which allows remote attackers to defeat a fingerprint-based certificate-blacklist protection mechanism by including crafted data within a certificate's unsigned portion, related to crypto/asn1/a_verify.c, crypto/dsa/dsa_asn1.c, crypto/ecdsa/ecs_vrf.c, and crypto/x509/x_all.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8844db5d02df9a7c82d92c1036debbe3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105673" comment="compat-openssl097g-32bit less than 0.9.7g-13.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105674" comment="compat-openssl097g less than 0.9.7g-13.27.1"/>
		</criteria>
	</criteria>
	<!-- fa132e4f1eada61e2e68b052e1d2fb3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105652" comment="openssl-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105653" comment="openssl-devel-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105654" comment="openssl-devel less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105655" comment="openssl-doc less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105656" comment="openssl less than 0.9.8a-18.88.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8500" source="CVE"/>
	<description>
	ISC BIND 9.0.x through 9.8.x, 9.9.0 through 9.9.6, and 9.10.0 through 9.10.1 does not limit delegation chaining, which allows remote attackers to cause a denial of service (memory consumption and named crash) via a large or infinite number of referrals.
	</description>
 </metadata>
<!-- 13586bdce180bbb68a1aee89f5a4dbe2 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107658" comment="bind-chrootenv less than 9.6ESVR11P1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107659" comment="bind-devel less than 9.6ESVR11P1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107660" comment="bind-doc less than 9.6ESVR11P1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107661" comment="bind-libs-32bit less than 9.6ESVR11P1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107662" comment="bind-libs less than 9.6ESVR11P1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107663" comment="bind-utils less than 9.6ESVR11P1-0.10.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107664" comment="bind less than 9.6ESVR11P1-0.10.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8594</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8594" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8594" source="CVE"/>
	<description>
	The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
	</description>
 </metadata>
<!-- 2430903f7edca75f2ff542e854abf451 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105011" comment="xen-devel less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105012" comment="xen-doc-html less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105013" comment="xen-doc-pdf less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105014" comment="xen-doc-ps less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105015" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105016" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105017" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105018" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105019" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105020" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105021" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105022" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105023" comment="xen-libs-32bit less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105024" comment="xen-libs less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105025" comment="xen-tools-domU less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105026" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105027" comment="xen-tools less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105028" comment="xen less than 3.2.3_17040_46-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8595</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8595" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8595" source="CVE"/>
	<description>
	arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
	</description>
 </metadata>
<!-- 2430903f7edca75f2ff542e854abf451 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105011" comment="xen-devel less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105012" comment="xen-doc-html less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105013" comment="xen-doc-pdf less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105014" comment="xen-doc-ps less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105015" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105016" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105017" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105018" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105019" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105020" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105021" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105022" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105023" comment="xen-libs-32bit less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105024" comment="xen-libs less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105025" comment="xen-tools-domU less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105026" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105027" comment="xen-tools less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105028" comment="xen less than 3.2.3_17040_46-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8634</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8634" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8634" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8636</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8636" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8636" source="CVE"/>
	<description>
	The XrayWrapper implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly interact with a DOM object that has a named getter, which might allow remote attackers to execute arbitrary JavaScript code with chrome privileges via unspecified vectors.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8637</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8637" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8637" source="CVE"/>
	<description>
	Mozilla Firefox before 35.0 and SeaMonkey before 2.32 do not properly initialize memory for BMP images, which allows remote attackers to obtain sensitive information from process memory via a crafted web page that triggers the rendering of malformed BMP data within a CANVAS element.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8638</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8638" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8638" source="CVE"/>
	<description>
	The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8639</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8639" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8639" source="CVE"/>
	<description>
	Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8640</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8640" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8640" source="CVE"/>
	<description>
	The mozilla::dom::AudioParamTimeline::AudioNodeInputValue function in the Web Audio API implementation in Mozilla Firefox before 35.0 and SeaMonkey before 2.32 does not properly restrict timeline operations, which allows remote attackers to cause a denial of service (uninitialized-memory read and application crash) via crafted API calls.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148641" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8641</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8641" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8641" source="CVE"/>
	<description>
	Use-after-free vulnerability in the WebRTC implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, and SeaMonkey before 2.32 allows remote attackers to execute arbitrary code via crafted track data.
	</description>
 </metadata>
<!-- b6b2353659cdca6dc3d8d5d591e00851 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105646" comment="MozillaFirefox-translations less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105647" comment="MozillaFirefox less than 31.4.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105648" comment="mozilla-nss-32bit less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105649" comment="mozilla-nss-devel less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105650" comment="mozilla-nss-tools less than 3.17.3-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105651" comment="mozilla-nss less than 3.17.3-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8866</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8866" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8866" source="CVE"/>
	<description>
	The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
	</description>
 </metadata>
<!-- 2430903f7edca75f2ff542e854abf451 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105011" comment="xen-devel less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105012" comment="xen-doc-html less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105013" comment="xen-doc-pdf less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105014" comment="xen-doc-ps less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105015" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105016" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105017" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105018" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105019" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105020" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105021" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105022" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105023" comment="xen-libs-32bit less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105024" comment="xen-libs less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105025" comment="xen-tools-domU less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105026" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105027" comment="xen-tools less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105028" comment="xen less than 3.2.3_17040_46-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148867" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8867</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8867" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8867" source="CVE"/>
	<description>
	The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
	</description>
 </metadata>
<!-- 2430903f7edca75f2ff542e854abf451 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105011" comment="xen-devel less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105012" comment="xen-doc-html less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105013" comment="xen-doc-pdf less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105014" comment="xen-doc-ps less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105015" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105016" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105017" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105018" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105019" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105020" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105021" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105022" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105023" comment="xen-libs-32bit less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105024" comment="xen-libs less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105025" comment="xen-tools-domU less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105026" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105027" comment="xen-tools less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105028" comment="xen less than 3.2.3_17040_46-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8891</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8891" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8891" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to escape the Java sandbox and execute arbitrary code via unspecified vectors related to the security manager.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20148892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-8892</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-8892" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8892" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 5.0 before SR16-FP9, 6 before SR16-FP3, 6R1 before SR8-FP3, 7 before SR8-FP10, and 7R1 before SR2-FP10 allows remote attackers to bypass intended access permissions and obtain sensitive information via unspecified vectors related to the security manager.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 2c3b79e944e87fd633df27d6879fd0ea -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106826" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106827" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106828" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106829" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106830" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106831" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106832" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106833" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.9-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106834" comment="java-1_5_0-ibm less than 1.5.0_sr16.9-0.6.1"/>
		</criteria>
	</criteria>
	<!-- a992e300008dd2cf884e0b1fa9206267 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009106307" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106308" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106309" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106310" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106311" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106312" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106313" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106314" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106315" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.3-0.9.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009106316" comment="java-1_6_0-ibm less than 1.6.0_sr16.3-0.9.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9030</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9030" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9030" source="CVE"/>
	<description>
	The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
	</description>
 </metadata>
<!-- 2430903f7edca75f2ff542e854abf451 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105011" comment="xen-devel less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105012" comment="xen-doc-html less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105013" comment="xen-doc-pdf less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105014" comment="xen-doc-ps less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105015" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105016" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105017" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105018" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105019" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105020" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105021" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105022" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105023" comment="xen-libs-32bit less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105024" comment="xen-libs less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105025" comment="xen-tools-domU less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105026" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105027" comment="xen-tools less than 3.2.3_17040_46-0.9.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105028" comment="xen less than 3.2.3_17040_46-0.9.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9050</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9050" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9050" source="CVE"/>
	<description>
	Heap-based buffer overflow in the cli_scanpe function in libclamav/pe.c in ClamAV before 0.98.5 allows remote attackers to cause a denial of service (crash) via a crafted y0da Crypter PE file.
	</description>
 </metadata>
<!-- b71adb6b19097f47d8e0eb43a5efa4ef -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009104885" comment="clamav less than 0.98.5-0.7.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9065</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-9065" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9065" source="CVE"/>
	<description>
	common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9066</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2014-9066" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9066" source="CVE"/>
	<description>
	Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability than CVE-2014-9065.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9090</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9090" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090" source="CVE"/>
	<description>
	The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9293</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9293" source="CVE"/>
	<description>
	The config_auth function in ntpd in NTP before 4.2.7p11, when an auth key is not configured, improperly generates a key, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
	</description>
 </metadata>
<!-- 8c2302f77b01413a386c6a33bf81dd42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106174" comment="xntp-doc less than 4.2.4p3-48.27.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106175" comment="xntp less than 4.2.4p3-48.27.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9294</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9294" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9294" source="CVE"/>
	<description>
	util/ntp-keygen.c in ntp-keygen in NTP before 4.2.7p230 uses a weak RNG seed, which makes it easier for remote attackers to defeat cryptographic protection mechanisms via a brute-force attack.
	</description>
 </metadata>
<!-- 8c2302f77b01413a386c6a33bf81dd42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106174" comment="xntp-doc less than 4.2.4p3-48.27.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106175" comment="xntp less than 4.2.4p3-48.27.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9295</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9295" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9295" source="CVE"/>
	<description>
	Multiple stack-based buffer overflows in ntpd in NTP before 4.2.8 allow remote attackers to execute arbitrary code via a crafted packet, related to (1) the crypto_recv function when the Autokey Authentication feature is used, (2) the ctl_putdata function, and (3) the configure function.
	</description>
 </metadata>
<!-- f4d33535cb6a1f3819d1cd7bb928b58f -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105039" comment="xntp-doc less than 4.2.4p3-48.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105040" comment="xntp less than 4.2.4p3-48.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9297</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9297" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9297" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8c2302f77b01413a386c6a33bf81dd42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106174" comment="xntp-doc less than 4.2.4p3-48.27.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106175" comment="xntp less than 4.2.4p3-48.27.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9298</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9298" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9298" source="CVE"/>
	<description>
	** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-2014-9750, CVE-2014-9751.  Reason: this ID was intended for one issue, but was associated with two issues.  Notes: All CVE users should consult CVE-2014-9750 and CVE-2014-9751 to identify the ID or IDs of interest. All references and descriptions in this candidate have been removed to prevent accidental usage.
	</description>
 </metadata>
<!-- 8c2302f77b01413a386c6a33bf81dd42 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009106174" comment="xntp-doc less than 4.2.4p3-48.27.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009106175" comment="xntp less than 4.2.4p3-48.27.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9322</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9322" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322" source="CVE"/>
	<description>
	arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9328</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9328" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9328" source="CVE"/>
	<description>
	ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upack packer file, related to a "heap out of bounds condition."
	</description>
 </metadata>
<!-- b856018fc4dcd95c039167b1ea1c6e5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107555" comment="clamav less than 0.98.6-0.8.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9402</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" source="CVE"/>
	<description>
	The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
	</description>
 </metadata>
<!-- ddad3e23b15c5919bf5e29a0fcedc637 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107927" comment="glibc-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107928" comment="glibc-devel-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107929" comment="glibc-devel less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107930" comment="glibc-html less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107931" comment="glibc-i18ndata less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107932" comment="glibc-info less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107933" comment="glibc-locale-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107934" comment="glibc-locale less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107935" comment="glibc-profile-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107936" comment="glibc-profile less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107937" comment="glibc less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107938" comment="nscd less than 2.4-31.117.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9420</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9420" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9420" source="CVE"/>
	<description>
	The rock_continue function in fs/isofs/rock.c in the Linux kernel through 3.18.1 does not restrict the number of Rock Ridge continuation entries, which allows local users to cause a denial of service (infinite loop, and system crash or hang) via a crafted iso9660 image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20149584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2014-9584</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2014-9584" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9584" source="CVE"/>
	<description>
	The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel memory via a crafted iso9660 image.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0138</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0138" source="CVE"/>
	<description>
	GSKit in IBM Tivoli Directory Server (ITDS) 6.0 before 6.0.0.73-ISS-ITDS-IF0073, 6.1 before 6.1.0.66-ISS-ITDS-IF0066, 6.2 before 6.2.0.42-ISS-ITDS-IF0042, and 6.3 before 6.3.0.35-ISS-ITDS-IF0035 and IBM Security Directory Server (ISDS) 6.3.1 before 6.3.1.9-ISS-ISDS-IF0009 does not properly restrict TLS state transitions, which makes it easier for remote attackers to conduct cipher-downgrade attacks to EXPORT_RSA ciphers via crafted TLS traffic, related to the "FREAK" issue, a different vulnerability than CVE-2015-0204.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0192</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0192" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0192" source="CVE"/>
	<description>
	Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0204</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0204" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0204" source="CVE"/>
	<description>
	The ssl3_get_key_exchange function in s3_clnt.c in OpenSSL before 0.9.8zd, 1.0.0 before 1.0.0p, and 1.0.1 before 1.0.1k allows remote SSL servers to conduct RSA-to-EXPORT_RSA downgrade attacks and facilitate brute-force decryption by offering a weak ephemeral RSA key in a noncompliant role, related to the "FREAK" issue.  NOTE: the scope of this CVE is only client code based on OpenSSL, not EXPORT_RSA issues associated with servers or other TLS implementations.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- 8844db5d02df9a7c82d92c1036debbe3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105673" comment="compat-openssl097g-32bit less than 0.9.7g-13.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105674" comment="compat-openssl097g less than 0.9.7g-13.27.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
	<!-- fa132e4f1eada61e2e68b052e1d2fb3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105652" comment="openssl-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105653" comment="openssl-devel-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105654" comment="openssl-devel less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105655" comment="openssl-doc less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105656" comment="openssl less than 0.9.8a-18.88.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0205</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0205" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0205" source="CVE"/>
	<description>
	The ssl3_get_cert_verify function in s3_srvr.c in OpenSSL 1.0.0 before 1.0.0p and 1.0.1 before 1.0.1k accepts client authentication with a Diffie-Hellman (DH) certificate without requiring a CertificateVerify message, which allows remote attackers to obtain access without knowledge of a private key via crafted TLS Handshake Protocol traffic to a server that recognizes a Certification Authority with DH support.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8844db5d02df9a7c82d92c1036debbe3 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105673" comment="compat-openssl097g-32bit less than 0.9.7g-13.27.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105674" comment="compat-openssl097g less than 0.9.7g-13.27.1"/>
		</criteria>
	</criteria>
	<!-- fa132e4f1eada61e2e68b052e1d2fb3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009105652" comment="openssl-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105653" comment="openssl-devel-32bit less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105654" comment="openssl-devel less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105655" comment="openssl-doc less than 0.9.8a-18.88.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009105656" comment="openssl less than 0.9.8a-18.88.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0209</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0209" source="CVE"/>
	<description>
	Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.
	</description>
 </metadata>
<!-- eec1ae898b7841dccefa6d941018057e -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107945" comment="openssl-32bit less than 0.9.8a-18.90.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107946" comment="openssl-devel-32bit less than 0.9.8a-18.90.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107947" comment="openssl-devel less than 0.9.8a-18.90.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107948" comment="openssl-doc less than 0.9.8a-18.90.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107949" comment="openssl less than 0.9.8a-18.90.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0235</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0235" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235" source="CVE"/>
	<description>
	Heap-based buffer overflow in the __nss_hostname_digits_dots function in glibc 2.2, and other 2.x versions before 2.18, allows context-dependent attackers to execute arbitrary code via vectors related to the (1) gethostbyname or (2) gethostbyname2 function, aka "GHOST."
	</description>
 </metadata>
<!-- 7fbea3f9bf3b0ca0902540ea678de798 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009105525" comment="glibc-32bit less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105526" comment="glibc-devel-32bit less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105527" comment="glibc-devel less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105528" comment="glibc-html less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105529" comment="glibc-i18ndata less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105530" comment="glibc-info less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105531" comment="glibc-locale-32bit less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105532" comment="glibc-locale less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105533" comment="glibc-profile-32bit less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105534" comment="glibc-profile less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105535" comment="glibc less than 2.4-31.113.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009105536" comment="nscd less than 2.4-31.113.3"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0286</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0286" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0286" source="CVE"/>
	<description>
	The ASN1_TYPE_cmp function in crypto/asn1/a_type.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly perform boolean-type comparisons, which allows remote attackers to cause a denial of service (invalid read operation and application crash) via a crafted X.509 certificate to an endpoint that uses the certificate-verification feature.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f17161da9396c0b8ebe105d38ad90d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107950" comment="compat-openssl097g-32bit less than 0.9.7g-13.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107951" comment="compat-openssl097g less than 0.9.7g-13.29.1"/>
		</criteria>
	</criteria>
	<!-- eec1ae898b7841dccefa6d941018057e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107945" comment="openssl-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107946" comment="openssl-devel-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107947" comment="openssl-devel less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107948" comment="openssl-doc less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107949" comment="openssl less than 0.9.8a-18.90.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0287</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0287" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0287" source="CVE"/>
	<description>
	The ASN1_item_ex_d2i function in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not reinitialize CHOICE and ADB data structures, which might allow attackers to cause a denial of service (invalid write operation and memory corruption) by leveraging an application that relies on ASN.1 structure reuse.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f17161da9396c0b8ebe105d38ad90d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107950" comment="compat-openssl097g-32bit less than 0.9.7g-13.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107951" comment="compat-openssl097g less than 0.9.7g-13.29.1"/>
		</criteria>
	</criteria>
	<!-- 5965d0982b34e01de9e5c15991f88378 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
		</criteria>
	</criteria>
	<!-- eec1ae898b7841dccefa6d941018057e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107945" comment="openssl-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107946" comment="openssl-devel-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107947" comment="openssl-devel less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107948" comment="openssl-doc less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107949" comment="openssl less than 0.9.8a-18.90.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0288</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0288" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0288" source="CVE"/>
	<description>
	The X509_to_X509_REQ function in crypto/x509/x509_req.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow attackers to cause a denial of service (NULL pointer dereference and application crash) via an invalid certificate key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f17161da9396c0b8ebe105d38ad90d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107950" comment="compat-openssl097g-32bit less than 0.9.7g-13.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107951" comment="compat-openssl097g less than 0.9.7g-13.29.1"/>
		</criteria>
	</criteria>
	<!-- eec1ae898b7841dccefa6d941018057e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107945" comment="openssl-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107946" comment="openssl-devel-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107947" comment="openssl-devel less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107948" comment="openssl-doc less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107949" comment="openssl less than 0.9.8a-18.90.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0289</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0289" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0289" source="CVE"/>
	<description>
	The PKCS#7 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a does not properly handle a lack of outer ContentInfo, which allows attackers to cause a denial of service (NULL pointer dereference and application crash) by leveraging an application that processes arbitrary PKCS#7 data and providing malformed data with ASN.1 encoding, related to crypto/pkcs7/pk7_doit.c and crypto/pkcs7/pk7_lib.c.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f17161da9396c0b8ebe105d38ad90d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107950" comment="compat-openssl097g-32bit less than 0.9.7g-13.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107951" comment="compat-openssl097g less than 0.9.7g-13.29.1"/>
		</criteria>
	</criteria>
	<!-- eec1ae898b7841dccefa6d941018057e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107945" comment="openssl-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107946" comment="openssl-devel-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107947" comment="openssl-devel less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107948" comment="openssl-doc less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107949" comment="openssl less than 0.9.8a-18.90.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0292</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0292" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0292" source="CVE"/>
	<description>
	Integer underflow in the EVP_DecodeUpdate function in crypto/evp/encode.c in the base64-decoding implementation in OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted base64 data that triggers a buffer overflow.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f17161da9396c0b8ebe105d38ad90d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107950" comment="compat-openssl097g-32bit less than 0.9.7g-13.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107951" comment="compat-openssl097g less than 0.9.7g-13.29.1"/>
		</criteria>
	</criteria>
	<!-- eec1ae898b7841dccefa6d941018057e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107945" comment="openssl-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107946" comment="openssl-devel-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107947" comment="openssl-devel less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107948" comment="openssl-doc less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107949" comment="openssl less than 0.9.8a-18.90.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0293</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0293" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" source="CVE"/>
	<description>
	The SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a allows remote attackers to cause a denial of service (s2_lib.c assertion failure and daemon exit) via a crafted CLIENT-MASTER-KEY message.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 3f17161da9396c0b8ebe105d38ad90d0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107950" comment="compat-openssl097g-32bit less than 0.9.7g-13.29.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107951" comment="compat-openssl097g less than 0.9.7g-13.29.1"/>
		</criteria>
	</criteria>
	<!-- 5965d0982b34e01de9e5c15991f88378 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
		</criteria>
	</criteria>
	<!-- eec1ae898b7841dccefa6d941018057e -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009107945" comment="openssl-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107946" comment="openssl-devel-32bit less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107947" comment="openssl-devel less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107948" comment="openssl-doc less than 0.9.8a-18.90.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009107949" comment="openssl less than 0.9.8a-18.90.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0458</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0458" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0458" source="CVE"/>
	<description>
	Unspecified vulnerability in in Oracle Java SE 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0459</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0459" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0459" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JavaFX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0491.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0469</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0469" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0469" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0477</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0477" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity via unknown vectors related to Beans.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0478</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0478" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect confidentiality via vectors related to JCE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0480</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0480" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0480" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect integrity and availability via unknown vectors related to Tools.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0488</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0488" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and JRockit R28.3.5, allows remote attackers to affect availability via vectors related to JSSE.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0491</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0491" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40, and Java FX 2.2.76, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D, a different vulnerability than CVE-2015-0459.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0817</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0817" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0817" source="CVE"/>
	<description>
	The asm.js implementation in Mozilla Firefox before 36.0.3, Firefox ESR 31.x before 31.5.2, and SeaMonkey before 2.33.1 does not properly determine the cases in which bounds checking may be safely skipped during JIT compilation and heap access, which allows remote attackers to read or write to unintended memory locations, and consequently execute arbitrary code, via crafted JavaScript.
	</description>
 </metadata>
<!-- 46e1d668433ddb6f934feef219ec5983 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108154" comment="MozillaFirefox-translations less than 31.5.3esr-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108155" comment="MozillaFirefox less than 31.5.3esr-0.5.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0818</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0818" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0818" source="CVE"/>
	<description>
	Mozilla Firefox before 36.0.4, Firefox ESR 31.x before 31.5.3, and SeaMonkey before 2.33.1 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving SVG hash navigation.
	</description>
 </metadata>
<!-- 46e1d668433ddb6f934feef219ec5983 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108154" comment="MozillaFirefox-translations less than 31.5.3esr-0.5.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108155" comment="MozillaFirefox less than 31.5.3esr-0.5.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0822</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0822" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0822" source="CVE"/>
	<description>
	The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.
	</description>
 </metadata>
<!-- 620f31f396ab13eab1f112060f474aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107221" comment="MozillaFirefox-translations less than 31.5.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107222" comment="MozillaFirefox less than 31.5.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0827</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0827" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0827" source="CVE"/>
	<description>
	Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.
	</description>
 </metadata>
<!-- 620f31f396ab13eab1f112060f474aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107221" comment="MozillaFirefox-translations less than 31.5.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107222" comment="MozillaFirefox less than 31.5.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0831</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0831" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0831" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.
	</description>
 </metadata>
<!-- 620f31f396ab13eab1f112060f474aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107221" comment="MozillaFirefox-translations less than 31.5.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107222" comment="MozillaFirefox less than 31.5.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0835</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0835" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 620f31f396ab13eab1f112060f474aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107221" comment="MozillaFirefox-translations less than 31.5.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107222" comment="MozillaFirefox less than 31.5.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20150836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-0836</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-0836" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0836" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 620f31f396ab13eab1f112060f474aba -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107221" comment="MozillaFirefox-translations less than 31.5.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107222" comment="MozillaFirefox less than 31.5.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1461</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1461" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1461" source="CVE"/>
	<description>
	ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted (1) Yoda's crypter or (2) mew packer file, related to a "heap out of bounds condition."
	</description>
 </metadata>
<!-- b856018fc4dcd95c039167b1ea1c6e5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107555" comment="clamav less than 0.98.6-0.8.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1462</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1462" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1462" source="CVE"/>
	<description>
	ClamAV before 0.98.6 allows remote attackers to have unspecified impact via a crafted upx packer file, related to a "heap out of bounds condition."
	</description>
 </metadata>
<!-- b856018fc4dcd95c039167b1ea1c6e5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107555" comment="clamav less than 0.98.6-0.8.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1463</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1463" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1463" source="CVE"/>
	<description>
	ClamAV before 0.98.6 allows remote attackers to cause a denial of service (crash) via a crafted petite packer file, related to an "incorrect compiler optimization."
	</description>
 </metadata>
<!-- b856018fc4dcd95c039167b1ea1c6e5d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107555" comment="clamav less than 0.98.6-0.8.1"/>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1472</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1472" source="CVE"/>
	<description>
	The ADDW macro in stdio-common/vfscanf.c in the GNU C Library (aka glibc or libc6) before 2.21 does not properly consider data-type size during memory allocation, which allows context-dependent attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long line containing wide characters that are improperly handled in a wscanf call.
	</description>
 </metadata>
<!-- ddad3e23b15c5919bf5e29a0fcedc637 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009107927" comment="glibc-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107928" comment="glibc-devel-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107929" comment="glibc-devel less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107930" comment="glibc-html less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107931" comment="glibc-i18ndata less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107932" comment="glibc-info less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107933" comment="glibc-locale-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107934" comment="glibc-locale less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107935" comment="glibc-profile-32bit less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107936" comment="glibc-profile less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107937" comment="glibc less than 2.4-31.117.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009107938" comment="nscd less than 2.4-31.117.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1788</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1788" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1788" source="CVE"/>
	<description>
	The BN_GF2m_mod_inv function in crypto/bn/bn_gf2m.c in OpenSSL before 0.9.8s, 1.0.0 before 1.0.0e, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b does not properly handle ECParameters structures in which the curve is over a malformed binary polynomial field, which allows remote attackers to cause a denial of service (infinite loop) via a session that uses an Elliptic Curve algorithm, as demonstrated by an attack against a server that supports client authentication.
	</description>
 </metadata>
<!-- 9f7ad0f893ed0c841ceae726daca55cd -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009110868" comment="openssl-32bit less than 0.9.8a-18.92.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009110869" comment="openssl-devel-32bit less than 0.9.8a-18.92.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009110870" comment="openssl-devel less than 0.9.8a-18.92.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009110871" comment="openssl-doc less than 0.9.8a-18.92.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009110872" comment="openssl less than 0.9.8a-18.92.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1789</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1789" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1789" source="CVE"/>
	<description>
	The X509_cmp_time function in crypto/x509/x509_vfy.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted length field in ASN1_TIME data, as demonstrated by an attack against a server that supports client authentication with a custom verification callback.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31613a0a584dc47c4e6779e1a0a09b87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110874" comment="compat-openssl097g-32bit less than 0.9.7g-13.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110875" comment="compat-openssl097g less than 0.9.7g-13.31.1"/>
		</criteria>
	</criteria>
	<!-- 9f7ad0f893ed0c841ceae726daca55cd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110868" comment="openssl-32bit less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110869" comment="openssl-devel-32bit less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110870" comment="openssl-devel less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110871" comment="openssl-doc less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110872" comment="openssl less than 0.9.8a-18.92.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1790</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1790" source="CVE"/>
	<description>
	The PKCS7_dataDecodefunction in crypto/pkcs7/pk7_doit.c in OpenSSL before 0.9.8zg, 1.0.0 before 1.0.0s, 1.0.1 before 1.0.1n, and 1.0.2 before 1.0.2b allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a PKCS#7 blob that uses ASN.1 encoding and lacks inner EncryptedContent data.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31613a0a584dc47c4e6779e1a0a09b87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110874" comment="compat-openssl097g-32bit less than 0.9.7g-13.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110875" comment="compat-openssl097g less than 0.9.7g-13.31.1"/>
		</criteria>
	</criteria>
	<!-- 9f7ad0f893ed0c841ceae726daca55cd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110868" comment="openssl-32bit less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110869" comment="openssl-devel-32bit less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110870" comment="openssl-devel less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110871" comment="openssl-doc less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110872" comment="openssl less than 0.9.8a-18.92.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1798</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1798" source="CVE"/>
	<description>
	The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1799</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1799" source="CVE"/>
	<description>
	The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP 3.x and 4.x before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service (synchronization loss) by spoofing the source IP address of a peer.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20151914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-1914</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-1914" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1914" source="CVE"/>
	<description>
	IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2041</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-2041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2041" source="CVE"/>
	<description>
	net/llc/sysctl_net_llc.c in the Linux kernel before 3.19 uses an incorrect data type in a sysctl table, which allows local users to obtain potentially sensitive information from kernel memory or possibly have unspecified other impact by accessing a sysctl entry.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 15c960abc4733df91b510dfe4ba2ac6d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 2a99948c9c3be4a024a9fa4d408002be -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
	<!-- 53c468d2b277f3335fcb5ddb08bda2e4 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009109199" comment="kernel-bigsmp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109192" comment="kernel-debug less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109193" comment="kernel-default less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109194" comment="kernel-kdump less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109200" comment="kernel-kdumppae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109195" comment="kernel-smp less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109196" comment="kernel-source less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109197" comment="kernel-syms less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109201" comment="kernel-vmi less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109202" comment="kernel-vmipae less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109198" comment="kernel-xen less than 2.6.16.60-0.132.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009109203" comment="kernel-xenpae less than 2.6.16.60-0.132.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2044</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-2044" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2044" source="CVE"/>
	<description>
	The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2045</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-2045" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2045" source="CVE"/>
	<description>
	The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2151</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-2151" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2151" source="CVE"/>
	<description>
	The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- eb058b67acad47659a336d914d8e2fd0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009108936" comment="xen-devel less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108937" comment="xen-doc-html less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108938" comment="xen-doc-pdf less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108939" comment="xen-doc-ps less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108940" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108941" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108942" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108943" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108944" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108945" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108946" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108947" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108948" comment="xen-libs-32bit less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108949" comment="xen-libs less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108950" comment="xen-tools-domU less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108951" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108952" comment="xen-tools less than 3.2.3_17040_46-0.13.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009108953" comment="xen less than 3.2.3_17040_46-0.13.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152625" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2625</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-2625" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2625" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45; JRockit R28.3.6; and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality via vectors related to JSSE.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20152808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-2808</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2808" source="CVE"/>
	<description>
	The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 750c96f801a1b590f58f15adc3b52b3d -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
		</criteria>
	</criteria>
	<!-- 75c7c1e62322e337b7527c52591a9e20 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110582" comment="java-1_5_0-ibm-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110583" comment="java-1_5_0-ibm-alsa-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110584" comment="java-1_5_0-ibm-alsa less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110585" comment="java-1_5_0-ibm-devel-32bit less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110586" comment="java-1_5_0-ibm-devel less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110587" comment="java-1_5_0-ibm-fonts less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110588" comment="java-1_5_0-ibm-jdbc less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110589" comment="java-1_5_0-ibm-plugin less than 1.5.0_sr16.10-0.6.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110590" comment="java-1_5_0-ibm less than 1.5.0_sr16.10-0.6.1"/>
		</criteria>
	</criteria>
	<!-- c5428e2c57be4bc06608802e52f69888 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110669" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110670" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110671" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110672" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110673" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110674" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110675" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110676" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110677" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.4-0.8.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110678" comment="java-1_6_0-ibm less than 1.6.0_sr16.4-0.8.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3195</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-3195" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" source="CVE"/>
	<description>
	The ASN1_TFLG_COMBINE implementation in crypto/asn1/tasn_dec.c in OpenSSL before 0.9.8zh, 1.0.0 before 1.0.0t, 1.0.1 before 1.0.1q, and 1.0.2 before 1.0.2e mishandles errors caused by malformed X509_ATTRIBUTE data, which allows remote attackers to obtain sensitive information from process memory by triggering a decoding failure in a PKCS#7 or CMS application.
	</description>
 </metadata>
<!-- 5965d0982b34e01de9e5c15991f88378 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3197</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-3197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" source="CVE"/>
	<description>
	ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
	</description>
 </metadata>
<!-- 5965d0982b34e01de9e5c15991f88378 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3209</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-3209" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3209" source="CVE"/>
	<description>
	Heap-based buffer overflow in the PCNET controller in QEMU allows remote attackers to execute arbitrary code by sending a packet with TXSTATUS_STARTPACKET set and then a crafted packet with TXSTATUS_DEVICEOWNS set.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8837c9fd890aaac522c74dc7741b001c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114712" comment="xen-devel less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114713" comment="xen-doc-html less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114714" comment="xen-doc-pdf less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114715" comment="xen-doc-ps less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114716" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114717" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114718" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114719" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114720" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114721" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114722" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114723" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114724" comment="xen-libs-32bit less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114725" comment="xen-libs less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114726" comment="xen-tools-domU less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114727" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114728" comment="xen-tools less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114729" comment="xen less than 3.2.3_17040_46-0.21.1"/>
		</criteria>
	</criteria>
	<!-- f26fb5291b18bbfa26447df16a7ab90f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111041" comment="xen-devel less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111042" comment="xen-doc-html less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111043" comment="xen-doc-pdf less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111044" comment="xen-doc-ps less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111045" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111046" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111047" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111048" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111049" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111050" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111051" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111052" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111053" comment="xen-libs-32bit less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111054" comment="xen-libs less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111055" comment="xen-tools-domU less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111056" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111057" comment="xen-tools less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111058" comment="xen less than 3.2.3_17040_46-0.17.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20153456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-3456</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-3456" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3456" source="CVE"/>
	<description>
	The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
	</description>
 </metadata>
<!-- 114b7cce479b39879add5cf1937e0e2d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009109887" comment="xen-devel less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109888" comment="xen-doc-html less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109889" comment="xen-doc-pdf less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109890" comment="xen-doc-ps less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109891" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109892" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109893" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109894" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109895" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109896" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109897" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109898" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109899" comment="xen-libs-32bit less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109900" comment="xen-libs less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109901" comment="xen-tools-domU less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109902" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109903" comment="xen-tools less than 3.2.3_17040_46-0.15.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009109904" comment="xen less than 3.2.3_17040_46-0.15.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4000</title>
	<affected family="unix">
		<platform>SLE CLIENT TOOLS 10 for s390x</platform>
		<platform>SLE CLIENT TOOLS 10 for x86</platform>
		<platform>SLE CLIENT TOOLS 10 for x86_64</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4000" source="CVE"/>
	<description>
	The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 31613a0a584dc47c4e6779e1a0a09b87 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110874" comment="compat-openssl097g-32bit less than 0.9.7g-13.31.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110875" comment="compat-openssl097g less than 0.9.7g-13.31.1"/>
		</criteria>
	</criteria>
	<!-- 9f7ad0f893ed0c841ceae726daca55cd -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009110868" comment="openssl-32bit less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110869" comment="openssl-devel-32bit less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110870" comment="openssl-devel less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110871" comment="openssl-doc less than 0.9.8a-18.92.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009110872" comment="openssl less than 0.9.8a-18.92.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4037</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4037" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4037" source="CVE"/>
	<description>
	The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4164</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4164" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4164" source="CVE"/>
	<description>
	The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 8837c9fd890aaac522c74dc7741b001c -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009114712" comment="xen-devel less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114713" comment="xen-doc-html less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114714" comment="xen-doc-pdf less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114715" comment="xen-doc-ps less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114716" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114717" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114718" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114719" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114720" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114721" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114722" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114723" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114724" comment="xen-libs-32bit less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114725" comment="xen-libs less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114726" comment="xen-tools-domU less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114727" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114728" comment="xen-tools less than 3.2.3_17040_46-0.21.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009114729" comment="xen less than 3.2.3_17040_46-0.21.1"/>
		</criteria>
	</criteria>
	<!-- f26fb5291b18bbfa26447df16a7ab90f -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111041" comment="xen-devel less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111042" comment="xen-doc-html less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111043" comment="xen-doc-pdf less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111044" comment="xen-doc-ps less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111045" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111046" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111047" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111048" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111049" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111050" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111051" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111052" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111053" comment="xen-libs-32bit less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111054" comment="xen-libs less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111055" comment="xen-tools-domU less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111056" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111057" comment="xen-tools less than 3.2.3_17040_46-0.17.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111058" comment="xen less than 3.2.3_17040_46-0.17.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4171</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
	</affected>
	<reference ref_id="CVE-2015-4171" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4171" source="CVE"/>
	<description>
	strongSwan 4.3.0 through 5.x before 5.3.2 and strongSwan VPN Client before 1.4.6, when using EAP or pre-shared keys for authenticating an IKEv2 connection, does not enforce server authentication restrictions until the entire authentication process is complete, which allows remote servers to obtain credentials by using a valid certificate and then reading the responses.
	</description>
 </metadata>
<!-- 98e26dc2a1696d47c59ab9aa31ce0c35 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009111116" comment="strongswan-doc less than 4.4.0-6.19.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009111117" comment="strongswan less than 4.4.0-6.19.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4473</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4473" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4473" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4474</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4474" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4474" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4475</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4475" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4475" source="CVE"/>
	<description>
	The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4478</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4478" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4478" source="CVE"/>
	<description>
	Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154479" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4479</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4479" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4479" source="CVE"/>
	<description>
	Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4484</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4484" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4484" source="CVE"/>
	<description>
	The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4485</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4485" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4485" source="CVE"/>
	<description>
	Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4486</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4486" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4486" source="CVE"/>
	<description>
	The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4487</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4487" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4487" source="CVE"/>
	<description>
	The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4488</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4488" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4488" source="CVE"/>
	<description>
	Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4489</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4489" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4489" source="CVE"/>
	<description>
	The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4491</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4491" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4491" source="CVE"/>
	<description>
	Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154492" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4492</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4492" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4492" source="CVE"/>
	<description>
	Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4497</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4497" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4497" source="CVE"/>
	<description>
	Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4498</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4498" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4498" source="CVE"/>
	<description>
	The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4500</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4500" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4501</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4501" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 41.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4506</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4506" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506" source="CVE"/>
	<description>
	Buffer overflow in the vp9_init_context_buffers function in libvpx, as used in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3, allows remote attackers to execute arbitrary code via a crafted VP9 file.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154509" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4509</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4509" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509" source="CVE"/>
	<description>
	Use-after-free vulnerability in the HTMLVideoElement interface in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via crafted JavaScript code that modifies the URI table of a media element, aka ZDI-CAN-3176.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4511</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4511" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4511" source="CVE"/>
	<description>
	Heap-based buffer overflow in the nestegg_track_codec_data function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allows remote attackers to execute arbitrary code via a crafted header in a WebM video.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4513</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4513" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4517</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517" source="CVE"/>
	<description>
	NetworkUtils.cpp in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4519</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519" source="CVE"/>
	<description>
	Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow user-assisted remote attackers to bypass intended access restrictions and discover a redirect's target URL via crafted JavaScript code that executes after a drag-and-drop action of an image into a TEXTBOX element.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4520</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4520" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520" source="CVE"/>
	<description>
	Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 allow remote attackers to bypass CORS preflight protection mechanisms by leveraging (1) duplicate cache-key generation or (2) retrieval of a value from an incorrect HTTP Access-Control-* response header.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4521</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4521" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521" source="CVE"/>
	<description>
	The ConvertDialogOptions function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154522" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4522</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4522" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522" source="CVE"/>
	<description>
	The nsUnicodeToUTF8::GetMaxLength function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4734</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4734" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4734" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JGSS.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4803</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4803" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4803" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4893 and CVE-2015-4911.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4805</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4805" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Serialization.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4806</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4806" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4806" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4810</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4810" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4810" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u85 and 8u60 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4835</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4835" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4835" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to CORBA, a different vulnerability than CVE-2015-4881.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4840</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4840" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4840" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u85 and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via unknown vectors related to 2D.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4842</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4842" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4842" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to JAXP.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154843" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4843</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4843" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4843" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4844</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4844" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4844" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4860</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4860" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4860" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4883.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4871</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 7u85 allows remote attackers to affect confidentiality and integrity via unknown vectors related to Libraries.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4872</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4872" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4872" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect integrity via unknown vectors related to Security.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4882</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4882" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4882" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect availability via vectors related to CORBA.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4883</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4883" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4883" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality, integrity, and availability via vectors related to RMI, a different vulnerability than CVE-2015-4860.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4893</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4893" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4893" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4911.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4902</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4902" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4902" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60 allows remote attackers to affect integrity via unknown vectors related to Deployment.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4903</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4903" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4903" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60, and Java SE Embedded 8u51, allows remote attackers to affect confidentiality via vectors related to RMI.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20154911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-4911</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-4911" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4911" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u101, 7u85, and 8u60; Java SE Embedded 8u51; and JRockit R28.3.7 allows remote attackers to affect availability via vectors related to JAXP, a different vulnerability than CVE-2015-4803 and CVE-2015-4893.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5006</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5006" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5006" source="CVE"/>
	<description>
	IBM Java Security Components in IBM SDK, Java Technology Edition 8 before SR2, 7 R1 before SR3 FP20, 7 before SR9 FP20, 6 R1 before SR8 FP15, and 6 before SR16 FP15 allow physically proximate attackers to obtain sensitive information by reading the Kerberos Credential Cache.
	</description>
 </metadata>
<!-- 750c96f801a1b590f58f15adc3b52b3d -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009121450" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121451" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121452" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121453" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121454" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121455" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121456" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121457" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121458" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.15-0.16.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009121459" comment="java-1_6_0-ibm less than 1.6.0_sr16.15-0.16.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5041</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5041" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5041" source="CVE"/>
	<description>
	The J9 JVM in IBM SDK, Java Technology Edition 6 before SR16 FP20, 6 R1 before SR8 FP20, 7 before SR9 FP30, and 7 R1 before SR3 FP30 allows remote attackers to obtain sensitive information or inject data by invoking non-public interface methods.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5154</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5154" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5154" source="CVE"/>
	<description>
	Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.
	</description>
 </metadata>
<!-- 8837c9fd890aaac522c74dc7741b001c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009114712" comment="xen-devel less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114713" comment="xen-doc-html less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114714" comment="xen-doc-pdf less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114715" comment="xen-doc-ps less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114716" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114717" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114718" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114719" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114720" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114721" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114722" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114723" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114724" comment="xen-libs-32bit less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114725" comment="xen-libs less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114726" comment="xen-tools-domU less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114727" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114728" comment="xen-tools less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114729" comment="xen less than 3.2.3_17040_46-0.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5165</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5165" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5165" source="CVE"/>
	<description>
	The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
	</description>
 </metadata>
<!-- 8837c9fd890aaac522c74dc7741b001c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009114712" comment="xen-devel less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114713" comment="xen-doc-html less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114714" comment="xen-doc-pdf less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114715" comment="xen-doc-ps less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114716" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114717" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114718" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114719" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114720" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114721" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114722" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114723" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114724" comment="xen-libs-32bit less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114725" comment="xen-libs less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114726" comment="xen-tools-domU less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114727" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114728" comment="xen-tools less than 3.2.3_17040_46-0.21.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009114729" comment="xen less than 3.2.3_17040_46-0.21.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5194</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194" source="CVE"/>
	<description>
	The log_config_command function in ntp_parser.y in ntpd in NTP before 4.2.7p42 allows remote attackers to cause a denial of service (ntpd crash) via crafted logconfig commands.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5239</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5239" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5239" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5252</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5252" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" source="CVE"/>
	<description>
	vfs.c in smbd in Samba 3.x and 4.x before 4.1.22, 4.2.x before 4.2.7, and 4.3.x before 4.3.3, when share names with certain substring relationships exist, allows remote attackers to bypass intended file-access restrictions via a symlink that points outside of a share.
	</description>
 </metadata>
<!-- 7a8b86525db490aaf0868ada97807c68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009126519" comment="cifs-mount less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126520" comment="ldapsmb less than 1.34b-25.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126521" comment="libmsrpc-devel less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126522" comment="libmsrpc less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126523" comment="libsmbclient-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126524" comment="libsmbclient-devel less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126525" comment="libsmbclient less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126526" comment="samba-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126527" comment="samba-client-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126528" comment="samba-client less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126529" comment="samba-doc less than 3.0.36-0.12.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126530" comment="samba-krb-printing less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126531" comment="samba-python less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126532" comment="samba-vscan less than 0.3.6b-43.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126533" comment="samba-winbind-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126534" comment="samba-winbind less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126535" comment="samba less than 3.0.36-0.13.32.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5278</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5278" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5278" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5300</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5300" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5300" source="CVE"/>
	<description>
	The panic_gate check in NTP before 4.2.8p5 is only re-enabled after the first change to the system clock that was greater than 128 milliseconds by default, which allows remote attackers to set NTP to an arbitrary time when started with the -g option, or to alter the time by up to 900 seconds otherwise by responding to an unspecified number of requests from trusted sources, and leveraging a resulting denial of service (abort and restart).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5307</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5307" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" source="CVE"/>
	<description>
	The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5477</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5477" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5477" source="CVE"/>
	<description>
	named in ISC BIND 9.x before 9.9.7-P2 and 9.10.x before 9.10.2-P3 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via TKEY queries.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 6c9cd85bd7aa9140126fe2cf192d0ac0 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009122110" comment="bind-chrootenv less than 9.6ESVR11P1-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122111" comment="bind-devel less than 9.6ESVR11P1-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122112" comment="bind-doc less than 9.6ESVR11P1-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122113" comment="bind-libs-32bit less than 9.6ESVR11P1-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122114" comment="bind-libs less than 9.6ESVR11P1-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122115" comment="bind-utils less than 9.6ESVR11P1-0.18.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009122116" comment="bind less than 9.6ESVR11P1-0.18.1"/>
		</criteria>
	</criteria>
	<!-- fe704ff20633640972645403977f8036 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009111533" comment="bind-chrootenv less than 9.6ESVR11P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111534" comment="bind-devel less than 9.6ESVR11P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111535" comment="bind-doc less than 9.6ESVR11P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111536" comment="bind-libs-32bit less than 9.6ESVR11P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111537" comment="bind-libs less than 9.6ESVR11P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111538" comment="bind-utils less than 9.6ESVR11P1-0.12.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009111539" comment="bind less than 9.6ESVR11P1-0.12.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20155722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-5722</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-5722" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5722" source="CVE"/>
	<description>
	buffer.c in named in ISC BIND 9.x before 9.9.7-P3 and 9.10.x before 9.10.2-P4 allows remote attackers to cause a denial of service (assertion failure and daemon exit) by creating a zone containing a malformed DNSSEC key and issuing a query for a name in that zone.
	</description>
 </metadata>
<!-- 6c9cd85bd7aa9140126fe2cf192d0ac0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009122110" comment="bind-chrootenv less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122111" comment="bind-devel less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122112" comment="bind-doc less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122113" comment="bind-libs-32bit less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122114" comment="bind-libs less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122115" comment="bind-utils less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122116" comment="bind less than 9.6ESVR11P1-0.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7174</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7174" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174" source="CVE"/>
	<description>
	The nsAttrAndChildArray::GrowBy function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7175</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7175" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175" source="CVE"/>
	<description>
	The XULContentSinkImpl::AddText function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors, related to an "overflow."
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7176</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7176" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176" source="CVE"/>
	<description>
	The AnimationThread function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 uses an incorrect argument to the sscanf function, which might allow remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7177</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7177" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177" source="CVE"/>
	<description>
	The InitTextures function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7180</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7180" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180" source="CVE"/>
	<description>
	The ReadbackResultWriterD3D11::Run function in Mozilla Firefox before 41.0 and Firefox ESR 38.x before 38.3 misinterprets the return value of a function call, which might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7181</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7181" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7181" source="CVE"/>
	<description>
	The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7182</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7182" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7182" source="CVE"/>
	<description>
	Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7183</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7183" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7183" source="CVE"/>
	<description>
	Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7188</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7188" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7188" source="CVE"/>
	<description>
	Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7189</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7189" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" source="CVE"/>
	<description>
	Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7193</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7193" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" source="CVE"/>
	<description>
	Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7194</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7194" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7194" source="CVE"/>
	<description>
	Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7196</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7196" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7196" source="CVE"/>
	<description>
	Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7197</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7197" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" source="CVE"/>
	<description>
	Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7198</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7198" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" source="CVE"/>
	<description>
	Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7199</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7199" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" source="CVE"/>
	<description>
	The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7200</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7200" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" source="CVE"/>
	<description>
	The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.
	</description>
 </metadata>
<!-- bb006e2ed6738badb2b7f4f52e5c1b2a -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009118077" comment="MozillaFirefox-branding-SLED less than 38-0.5.3"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118078" comment="MozillaFirefox-translations less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118079" comment="MozillaFirefox less than 38.4.0esr-0.7.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118080" comment="mozilla-nspr-32bit less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118081" comment="mozilla-nspr-devel less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118082" comment="mozilla-nspr less than 4.10.10-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118083" comment="mozilla-nss-32bit less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118084" comment="mozilla-nss-devel less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118085" comment="mozilla-nss-tools less than 3.19.2.1-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009118086" comment="mozilla-nss less than 3.19.2.1-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7504</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7504" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7512</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7512" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7512" source="CVE"/>
	<description>
	Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7575</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7575" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" source="CVE"/>
	<description>
	Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7691</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7691" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" source="CVE"/>
	<description>
	The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted packets containing particular autokey operations.  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7692</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7692" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" source="CVE"/>
	<description>
	The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7701</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7701" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" source="CVE"/>
	<description>
	Memory leak in the CRYPTO_ASSOC function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (memory consumption).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7702</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" source="CVE"/>
	<description>
	The crypto_xmit function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash).  NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-9750.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7703</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" source="CVE"/>
	<description>
	The "pidfile" or "driftfile" directives in NTP ntpd 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77, when ntpd is configured to allow remote configuration, allows remote attackers with an IP address that is allowed to send configuration requests, and with knowledge of the remote configuration password to write to arbitrary files via the :config command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7704</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7704" source="CVE"/>
	<description>
	The ntpd client in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service via a number of crafted "KOD" messages.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7705</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7705" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7705" source="CVE"/>
	<description>
	The rate limiting feature in NTP 4.x before 4.2.8p4 and 4.3.x before 4.3.77 allows remote attackers to have unspecified impact via a large number of crafted requests.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7848</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7848" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7848" source="CVE"/>
	<description>
	An integer overflow can occur in NTP-dev.4.3.70 leading to an out-of-bounds memory copy operation when processing a specially crafted private mode packet. The crafted packet needs to have the correct message authentication code and a valid timestamp. When processed by the NTP daemon, it leads to an immediate crash.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7849</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7849" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7849" source="CVE"/>
	<description>
	Use-after-free vulnerability in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to possibly execute arbitrary code or cause a denial of service (crash) via crafted packets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7850</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7850" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7850" source="CVE"/>
	<description>
	ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7851</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7851" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7851" source="CVE"/>
	<description>
	** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem.  When the candidate has been publicized, the details for this candidate will be provided.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7852</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7852" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" source="CVE"/>
	<description>
	ntpq in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (crash) via crafted mode 6 response packets.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7853</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7853" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7853" source="CVE"/>
	<description>
	The datalen parameter in the refclock driver in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative input value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7854</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7854" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7854" source="CVE"/>
	<description>
	Buffer overflow in the password management functionality in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (daemon crash) or possibly execute arbitrary code via a crafted key file.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7855</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7855" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7855" source="CVE"/>
	<description>
	The decodenetnum function in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to cause a denial of service (assertion failure) via a 6 or mode 7 packet containing a long data value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7871</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7871" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7871" source="CVE"/>
	<description>
	Crypto-NAK packets in ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote attackers to bypass authentication.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7971</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7971" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7971" source="CVE"/>
	<description>
	Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7973</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7973" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7973" source="CVE"/>
	<description>
	NTP before 4.2.8p6 and 4.3.x before 4.3.90, when configured in broadcast mode, allows man-in-the-middle attackers to conduct replay attacks by sniffing the network.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7974</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" source="CVE"/>
	<description>
	NTP 4.x before 4.2.8p6 and 4.3.x before 4.3.90 do not verify peer associations of symmetric keys when authenticating packets, which might allow remote attackers to conduct impersonation attacks via an arbitrary trusted key, aka a "skeleton key."
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157975" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7975</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7975" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7975" source="CVE"/>
	<description>
	The nextvar function in NTP before 4.2.8p6 and 4.3.x before 4.3.90 does not properly validate the length of its input, which allows an attacker to cause a denial of service (application crash).
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7976</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7976" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7976" source="CVE"/>
	<description>
	The ntpq saveconfig command in NTP 4.1.2, 4.2.x before 4.2.8p6, 4.3, 4.3.25, 4.3.70, and 4.3.77 does not properly filter special characters, which allows attackers to cause unspecified impact via a crafted filename.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7977</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" source="CVE"/>
	<description>
	ntpd in NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (NULL pointer dereference) via a ntpdc reslist command.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7978</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" source="CVE"/>
	<description>
	NTP before 4.2.8p6 and 4.3.0 before 4.3.90 allows a remote attackers to cause a denial of service (stack exhaustion) via an ntpdc relist command, which triggers recursive traversal of the restriction list.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7979</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" source="CVE"/>
	<description>
	NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (client-server association tear down) by sending broadcast packets with invalid authentication to a broadcast client.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20157981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-7981</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-7981" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" source="CVE"/>
	<description>
	The png_convert_to_rfc1123 function in png.c in libpng 1.0.x before 1.0.64, 1.2.x before 1.2.54, and 1.4.x before 1.4.17 allows remote attackers to obtain sensitive process memory information via crafted tIME chunk data in an image file, which triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8000</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8000" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" source="CVE"/>
	<description>
	db.c in named in ISC BIND 9.x before 9.9.8-P2 and 9.10.x before 9.10.3-P2 allows remote attackers to cause a denial of service (REQUIRE assertion failure and daemon exit) via a malformed class attribute.
	</description>
 </metadata>
<!-- 6c9cd85bd7aa9140126fe2cf192d0ac0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009122110" comment="bind-chrootenv less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122111" comment="bind-devel less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122112" comment="bind-doc less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122113" comment="bind-libs-32bit less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122114" comment="bind-libs less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122115" comment="bind-utils less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122116" comment="bind less than 9.6ESVR11P1-0.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8104</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8104" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" source="CVE"/>
	<description>
	The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8126</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8126" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" source="CVE"/>
	<description>
	Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8138</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8138" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" source="CVE"/>
	<description>
	NTP before 4.2.8p6 and 4.3.x before 4.3.90 allows remote attackers to bypass the origin timestamp validation via a packet with an origin timestamp set to zero.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8158</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8158" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" source="CVE"/>
	<description>
	The getresponse function in ntpq in NTP versions before 4.2.8p9 and 4.3.x before 4.3.90 allows remote attackers to cause a denial of service (infinite loop) via crafted packets with incorrect values.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8339</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8339" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8339" source="CVE"/>
	<description>
	The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8340</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8340" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8340" source="CVE"/>
	<description>
	The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8472</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8472" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" source="CVE"/>
	<description>
	Buffer overflow in the png_set_PLTE function in libpng before 1.0.65, 1.1.x and 1.2.x before 1.2.55, 1.3.x, 1.4.x before 1.4.18, 1.5.x before 1.5.25, and 1.6.x before 1.6.20 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-8126.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8504</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8504" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8504" source="CVE"/>
	<description>
	Qemu, when built with VNC display driver support, allows remote attackers to cause a denial of service (arithmetic exception and application crash) via crafted SetPixelFormat messages from a client.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8540</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8540" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8540" source="CVE"/>
	<description>
	Integer underflow in the png_check_keyword function in pngwutil.c in libpng 0.90 through 0.99, 1.0.x before 1.0.66, 1.1.x and 1.2.x before 1.2.56, 1.3.x and 1.4.x before 1.4.19, and 1.5.x before 1.5.26 allows remote attackers to have unspecified impact via a space character as a keyword in a PNG image, which triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8550" source="CVE"/>
	<description>
	Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8555</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8555" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8555" source="CVE"/>
	<description>
	Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
	</description>
 </metadata>
<!-- 085198b0d3665c1af17df9c5dcb0be80 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124424" comment="xen-devel less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124425" comment="xen-doc-html less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124426" comment="xen-doc-pdf less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124427" comment="xen-doc-ps less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124428" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124429" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124430" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124431" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124432" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124433" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124434" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124435" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124436" comment="xen-libs-32bit less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124437" comment="xen-libs less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124438" comment="xen-tools-domU less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124439" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124440" comment="xen-tools less than 3.2.3_17040_46-0.23.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124441" comment="xen less than 3.2.3_17040_46-0.23.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8704</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" source="CVE"/>
	<description>
	apl_42.c in ISC BIND 9.x before 9.9.8-P3, 9.9.x, and 9.10.x before 9.10.3-P3 allows remote authenticated users to cause a denial of service (INSIST assertion failure and daemon exit) via a malformed Address Prefix List (APL) record.
	</description>
 </metadata>
<!-- 6c9cd85bd7aa9140126fe2cf192d0ac0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009122110" comment="bind-chrootenv less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122111" comment="bind-devel less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122112" comment="bind-doc less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122113" comment="bind-libs-32bit less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122114" comment="bind-libs less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122115" comment="bind-utils less than 9.6ESVR11P1-0.18.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009122116" comment="bind less than 9.6ESVR11P1-0.18.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20158743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2015-8743</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2015-8743" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743" source="CVE"/>
	<description>
	QEMU (aka Quick Emulator) built with the NE2000 device emulation support is vulnerable to an OOB r/w access issue. It could occur while performing 'ioport' r/w operations. A privileged (CAP_SYS_RAWIO) user/process could use this flaw to leak or corrupt QEMU memory bytes.
	</description>
 </metadata>
<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0264</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0264" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0264" source="CVE"/>
	<description>
	Buffer overflow in the Java Virtual Machine (JVM) in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) allows remote attackers to execute arbitrary code via unspecified vectors.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0363</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0363" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0363" source="CVE"/>
	<description>
	The com.ibm.CORBA.iiop.ClientDelegate class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) uses the invoke method of the java.lang.reflect.Method class in an AccessController doPrivileged block, which allows remote attackers to call setSecurityManager and bypass a sandbox protection mechanism via vectors related to a Proxy object instance implementing the java.lang.reflect.InvocationHandler interface.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-3009.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0376</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0376" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0376" source="CVE"/>
	<description>
	The com.ibm.rmi.io.SunSerializableFactory class in IBM SDK, Java Technology Edition 6 before SR16 FP25 (6.0.16.25), 6 R1 before SR8 FP25 (6.1.8.25), 7 before SR9 FP40 (7.0.9.40), 7 R1 before SR3 FP40 (7.1.3.40), and 8 before SR3 (8.0.3.0) does not properly deserialize classes in an AccessController doPrivileged block, which allows remote attackers to bypass a sandbox protection mechanism and execute arbitrary code as demonstrated by the readValue method of the com.ibm.rmi.io.ValueHandlerPool.ValueHandlerSingleton class, which implements the javax.rmi.CORBA.ValueHandler interface.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-5456.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0402</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0402" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect integrity via unknown vectors related to Networking.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0448</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0448" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66, and Java SE Embedded 8u65 allows remote authenticated users to affect confidentiality via vectors related to JMX.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0466</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0466" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0483</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0483" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to AWT.  NOTE: the previous information is from the January 2016 CPU. Oracle has not commented on third-party claims that this is a heap-based buffer overflow in the readImage function, which allows remote attackers to execute arbitrary code via crafted image data.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0494</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0494" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" source="CVE"/>
	<description>
	Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE 6u105, 7u91, and 8u66 and Java SE Embedded 8u65 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
	</description>
 </metadata>
<!-- 569a7e75dde13c4a1b4a6ee50364308c -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124789" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124790" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124791" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124792" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124793" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124794" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124795" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124796" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124797" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.20-0.8.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124798" comment="java-1_6_0-ibm less than 1.6.0_sr16.20-0.8.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0686</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0686" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Serialization.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0687</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0687" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the Hotspot sub-component.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0702</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0702" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" source="CVE"/>
	<description>
	The MOD_EXP_CTIME_COPY_FROM_PREBUF function in crypto/bn/bn_exp.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g does not properly consider cache-bank access times during modular exponentiation, which makes it easier for local users to discover RSA keys by running a crafted application on the same Intel Sandy Bridge CPU core as a victim and leveraging cache-bank conflicts, aka a "CacheBleed" attack.
	</description>
 </metadata>
<!-- bfdaa5a35088a70db557cea0e263ef89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127917" comment="openssl-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127918" comment="openssl-devel-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127919" comment="openssl-devel less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127920" comment="openssl-doc less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127921" comment="openssl less than 0.9.8a-18.96.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0703</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0703" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" source="CVE"/>
	<description>
	The get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a accepts a nonzero CLIENT-MASTER-KEY CLEAR-KEY-LENGTH value for an arbitrary cipher, which allows man-in-the-middle attackers to determine the MASTER-KEY value and decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
	</description>
 </metadata>
<!-- 5965d0982b34e01de9e5c15991f88378 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0704</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0704" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0704" source="CVE"/>
	<description>
	An oracle protection mechanism in the get_client_master_key function in s2_srvr.c in the SSLv2 implementation in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a overwrites incorrect MASTER-KEY bytes during use of export cipher suites, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, a related issue to CVE-2016-0800.
	</description>
 </metadata>
<!-- 5965d0982b34e01de9e5c15991f88378 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0797</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" source="CVE"/>
	<description>
	Multiple integer overflows in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g allow remote attackers to cause a denial of service (heap memory corruption or NULL pointer dereference) or possibly have unspecified other impact via a long digit string that is mishandled by the (1) BN_dec2bn or (2) BN_hex2bn function, related to crypto/bn/bn.h and crypto/bn/bn_print.c.
	</description>
 </metadata>
<!-- 5965d0982b34e01de9e5c15991f88378 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0799</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" source="CVE"/>
	<description>
	The fmtstr function in crypto/bio/b_print.c in OpenSSL 1.0.1 before 1.0.1s and 1.0.2 before 1.0.2g improperly calculates string lengths, which allows remote attackers to cause a denial of service (overflow and out-of-bounds read) or possibly have unspecified other impact via a long string, as demonstrated by a large amount of ASN.1 data, a different vulnerability than CVE-2016-2842.
	</description>
 </metadata>
<!-- 5965d0982b34e01de9e5c15991f88378 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20160800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-0800</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-0800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" source="CVE"/>
	<description>
	The SSLv2 protocol, as used in OpenSSL before 1.0.1s and 1.0.2 before 1.0.2g and other products, requires a server to send a ServerVerify message before establishing that a client possesses certain plaintext RSA data, which makes it easier for remote attackers to decrypt TLS ciphertext data by leveraging a Bleichenbacher RSA padding oracle, aka a "DROWN" attack.
	</description>
 </metadata>
<!-- 5965d0982b34e01de9e5c15991f88378 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009124472" comment="openssl-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124473" comment="openssl-devel-32bit less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124474" comment="openssl-devel less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124475" comment="openssl-doc less than 0.9.8a-18.94.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009124476" comment="openssl less than 0.9.8a-18.94.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1547</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1547" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" source="CVE"/>
	<description>
	An off-path attacker can cause a preemptible client association to be demobilized in NTP 4.2.8p4 and earlier and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 by sending a crypto NAK packet to a victim client with a spoofed source address of an existing associated peer. This is true even if authentication is enabled.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1548</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1548" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" source="CVE"/>
	<description>
	An attacker can spoof a packet from a legitimate ntpd server with an origin timestamp that matches the peer-&gt;dst timestamp recorded for that server. After making this switch, the client in NTP 4.2.8p4 and earlier and NTPSec aa48d001683e5b791a743ec9c575aaf7d867a2b0c will reject all future legitimate server responses. It is possible to force the victim client to move time after the mode has been changed. ntpq gives no indication that the mode has been switched.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1549</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1549" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1549" source="CVE"/>
	<description>
	A malicious authenticated peer can create arbitrarily-many ephemeral associations in order to win the clock selection algorithm in ntpd in NTP 4.2.8p4 and earlier and NTPsec 3e160db8dc248a0bcb053b56a80167dc742d2b74 and a5fb34b9cc89b92a8fef2f459004865c93bb7f92 and modify a victim's clock.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1550</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1550" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" source="CVE"/>
	<description>
	An exploitable vulnerability exists in the message authentication functionality of libntp in ntp 4.2.8p4 and NTPSec a5fb34b9cc89b92a8fef2f459004865c93bb7f92. An attacker can send a series of crafted messages to attempt to recover the message digest key.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1551</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1551" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1551" source="CVE"/>
	<description>
	ntpd in NTP 4.2.8p3 and NTPsec a5fb34b9cc89b92a8fef2f459004865c93bb7f92 relies on the underlying operating system to protect it from requests that impersonate reference clocks. Because reference clocks are treated like other peers and stored in the same structure, any packet with a source ip address of a reference clock (127.127.1.1 for example) that reaches the receive() function will match that reference clock's peer record and will be treated as a trusted peer. Any system that lacks the typical martian packet filtering which would block these packets is in danger of having its time controlled by an attacker.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1950</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1950" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" source="CVE"/>
	<description>
	Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1952</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1952" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1953</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1953" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 45.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to js/src/jit/arm/Assembler-arm.cpp, and unknown other vectors.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1954</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" source="CVE"/>
	<description>
	The nsCSPContext::SendReports function in dom/security/nsCSPContext.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not prevent use of a non-HTTP report-uri for a Content Security Policy (CSP) violation report, which allows remote attackers to cause a denial of service (data overwrite) or possibly gain privileges by specifying a URL of a local file.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1957</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" source="CVE"/>
	<description>
	Memory leak in libstagefright in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to cause a denial of service (memory consumption) via an MPEG-4 file that triggers a delete operation on an array.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1958</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1958" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" source="CVE"/>
	<description>
	browser/base/content/browser.js in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to spoof the address bar via a javascript: URL.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161960" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1960</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1960" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" source="CVE"/>
	<description>
	Integer underflow in the nsHtml5TreeBuilder class in the HTML5 string parser in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free) by leveraging mishandling of end tags, as demonstrated by incorrect SVG processing, aka ZDI-CAN-3545.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1961</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1961" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" source="CVE"/>
	<description>
	Use-after-free vulnerability in the nsHTMLDocument::SetBody function in dom/html/nsHTMLDocument.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of a root element, aka ZDI-CAN-3574.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1962</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1962" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" source="CVE"/>
	<description>
	Use-after-free vulnerability in the mozilla::DataChannelConnection::Close function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code by leveraging mishandling of WebRTC data-channel connections.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1964</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1964" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" source="CVE"/>
	<description>
	Use-after-free vulnerability in the AtomicBaseIncDec function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging mishandling of XML transformations.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1965</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1965" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" source="CVE"/>
	<description>
	Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 mishandle a navigation sequence that returns to the original page, which allows remote attackers to spoof the address bar via vectors involving the history.back method and the location.protocol property.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1966</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1966" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" source="CVE"/>
	<description>
	The nsNPObjWrapper::GetNewOrUsed function in dom/plugins/base/nsJSNPRuntime.cpp in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 allows remote attackers to execute arbitrary code or cause a denial of service (invalid pointer dereference and memory corruption) via a crafted NPAPI plugin.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161974" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1974</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1974" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" source="CVE"/>
	<description>
	The nsScannerString::AppendUnicodeTo function in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7 does not verify that memory allocation succeeds, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via crafted Unicode data in an HTML, XML, or SVG document.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1977</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1977" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1977" source="CVE"/>
	<description>
	The Machine::Code::decoder::analysis::set_ref function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code or cause a denial of service (stack memory corruption) via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1978</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1978" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" source="CVE"/>
	<description>
	Use-after-free vulnerability in the ssl3_HandleECDHServerKeyExchange function in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact by making an SSL (1) DHE or (2) ECDHE handshake at a time of high memory consumption.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20161979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-1979</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-1979" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" source="CVE"/>
	<description>
	Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2105</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2105" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" source="CVE"/>
	<description>
	Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.
	</description>
 </metadata>
<!-- bfdaa5a35088a70db557cea0e263ef89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127917" comment="openssl-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127918" comment="openssl-devel-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127919" comment="openssl-devel less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127920" comment="openssl-doc less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127921" comment="openssl less than 0.9.8a-18.96.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2106</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2106" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" source="CVE"/>
	<description>
	Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.
	</description>
 </metadata>
<!-- bfdaa5a35088a70db557cea0e263ef89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127917" comment="openssl-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127918" comment="openssl-devel-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127919" comment="openssl-devel less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127920" comment="openssl-doc less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127921" comment="openssl less than 0.9.8a-18.96.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2108</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2108" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" source="CVE"/>
	<description>
	The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.
	</description>
 </metadata>
<!-- bfdaa5a35088a70db557cea0e263ef89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127917" comment="openssl-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127918" comment="openssl-devel-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127919" comment="openssl-devel less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127920" comment="openssl-doc less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127921" comment="openssl less than 0.9.8a-18.96.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2109</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2109" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" source="CVE"/>
	<description>
	The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.
	</description>
 </metadata>
<!-- bfdaa5a35088a70db557cea0e263ef89 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127917" comment="openssl-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127918" comment="openssl-devel-32bit less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127919" comment="openssl-devel less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127920" comment="openssl-doc less than 0.9.8a-18.96.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127921" comment="openssl less than 0.9.8a-18.96.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2110</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2110" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" source="CVE"/>
	<description>
	The NTLMSSP authentication implementation in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2 allows man-in-the-middle attackers to perform protocol-downgrade attacks by modifying the client-server data stream to remove application-layer flags or encryption settings, as demonstrated by clearing the NTLMSSP_NEGOTIATE_SEAL or NTLMSSP_NEGOTIATE_SIGN option to disrupt LDAP security.
	</description>
 </metadata>
<!-- 7a8b86525db490aaf0868ada97807c68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009126519" comment="cifs-mount less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126520" comment="ldapsmb less than 1.34b-25.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126521" comment="libmsrpc-devel less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126522" comment="libmsrpc less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126523" comment="libsmbclient-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126524" comment="libsmbclient-devel less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126525" comment="libsmbclient less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126526" comment="samba-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126527" comment="samba-client-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126528" comment="samba-client less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126529" comment="samba-doc less than 3.0.36-0.12.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126530" comment="samba-krb-printing less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126531" comment="samba-python less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126532" comment="samba-vscan less than 0.3.6b-43.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126533" comment="samba-winbind-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126534" comment="samba-winbind less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126535" comment="samba less than 3.0.36-0.13.32.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2111</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2111" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" source="CVE"/>
	<description>
	The NETLOGON service in Samba 3.x and 4.x before 4.2.11, 4.3.x before 4.3.8, and 4.4.x before 4.4.2, when a domain controller is configured, allows remote attackers to spoof the computer name of a secure channel's endpoint, and obtain sensitive session information, by running a crafted application and leveraging the ability to sniff network traffic, a related issue to CVE-2015-0005.
	</description>
 </metadata>
<!-- 7a8b86525db490aaf0868ada97807c68 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009126519" comment="cifs-mount less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126520" comment="ldapsmb less than 1.34b-25.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126521" comment="libmsrpc-devel less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126522" comment="libmsrpc less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126523" comment="libsmbclient-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126524" comment="libsmbclient-devel less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126525" comment="libsmbclient less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126526" comment="samba-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126527" comment="samba-client-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126528" comment="samba-client less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126529" comment="samba-doc less than 3.0.36-0.12.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126530" comment="samba-krb-printing less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126531" comment="samba-python less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126532" comment="samba-vscan less than 0.3.6b-43.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126533" comment="samba-winbind-32bit less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126534" comment="samba-winbind less than 3.0.36-0.13.32.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009126535" comment="samba less than 3.0.36-0.13.32.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2270</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2270" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2270" source="CVE"/>
	<description>
	Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
	</description>
 </metadata>
<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2271</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2271" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2271" source="CVE"/>
	<description>
	VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
	</description>
 </metadata>
<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2391</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2391" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2391" source="CVE"/>
	<description>
	The ohci_bus_start function in the USB OHCI emulation support (hw/usb/hcd-ohci.c) in QEMU allows local guest OS administrators to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors related to multiple eof_timers.
	</description>
 </metadata>
<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2516</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2516" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2516" source="CVE"/>
	<description>
	NTP before 4.2.8p7 and 4.3.x before 4.3.92, when mode7 is enabled, allows remote attackers to cause a denial of service (ntpd abort) by using the same IP address multiple times in an unconfig directive.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162517" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2517</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2517" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2517" source="CVE"/>
	<description>
	NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (prevent subsequent authentication) by leveraging knowledge of the controlkey or requestkey and sending a crafted packet to ntpd, which changes the value of trustedkey, controlkey, or requestkey.  NOTE: this vulnerability exists because of a CVE-2016-2516 regression.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2518</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2518" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" source="CVE"/>
	<description>
	The MATCH_ASSOC function in NTP before version 4.2.8p9 and 4.3.x before 4.3.92 allows remote attackers to cause an out-of-bounds reference via an addpeer request with a large hmode value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162519" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2519</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2519" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2519" source="CVE"/>
	<description>
	ntpd in NTP before 4.2.8p7 and 4.3.x before 4.3.92 allows remote attackers to cause a denial of service (ntpd abort) by a large request data value, which triggers the ctl_getitem function to return a NULL value.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2790</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2790" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2790" source="CVE"/>
	<description>
	The graphite2::TtfUtil::GetTableInfo function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2791</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2791" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2791" source="CVE"/>
	<description>
	The graphite2::GlyphCache::glyph function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2792</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2792" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2792" source="CVE"/>
	<description>
	The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2800.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2793</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2793" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2793" source="CVE"/>
	<description>
	CachedCmap.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2794</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2794" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2794" source="CVE"/>
	<description>
	The graphite2::TtfUtil::CmapSubtable12NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2795</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2795" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2795" source="CVE"/>
	<description>
	The graphite2::FileFace::get_table_fn function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, does not initialize memory for an unspecified data structure, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2796</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2796" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2796" source="CVE"/>
	<description>
	Heap-based buffer overflow in the graphite2::vm::Machine::Code::Code function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2797</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2797" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2797" source="CVE"/>
	<description>
	The graphite2::TtfUtil::CmapSubtable12Lookup function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2801.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2798</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2798" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2798" source="CVE"/>
	<description>
	The graphite2::GlyphCache::Loader::Loader function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2799</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2799" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2799" source="CVE"/>
	<description>
	Heap-based buffer overflow in the graphite2::Slot::setAttr function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2800</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2800" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2800" source="CVE"/>
	<description>
	The graphite2::Slot::getAttr function in Slot.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2792.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2801</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2801" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2801" source="CVE"/>
	<description>
	The graphite2::TtfUtil::CmapSubtable12Lookup function in TtfUtil.cpp in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font, a different vulnerability than CVE-2016-2797.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2802</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2802" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2802" source="CVE"/>
	<description>
	The graphite2::TtfUtil::CmapSubtable4NextCodepoint function in Graphite 2 before 1.3.6, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to cause a denial of service (buffer over-read) or possibly have unspecified other impact via a crafted Graphite smart font.
	</description>
 </metadata>
<!-- 482a54f33ffb2bd9e847625a26c86780 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009125144" comment="MozillaFirefox-translations less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125145" comment="MozillaFirefox less than 38.7.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125146" comment="mozilla-nspr-32bit less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125147" comment="mozilla-nspr-devel less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125148" comment="mozilla-nspr less than 4.12-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125149" comment="mozilla-nss-32bit less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125150" comment="mozilla-nss-devel less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125151" comment="mozilla-nss-tools less than 3.20.2-0.7.2"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009125152" comment="mozilla-nss less than 3.20.2-0.7.2"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2805</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2805" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" source="CVE"/>
	<description>
	Unspecified vulnerability in the browser engine in Mozilla Firefox ESR 38.x before 38.8 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- c4a992c726ddbf623907944154d39624 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127855" comment="MozillaFirefox-translations less than 38.8.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127856" comment="MozillaFirefox less than 38.8.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2807</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2807" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" source="CVE"/>
	<description>
	Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
	</description>
 </metadata>
<!-- c4a992c726ddbf623907944154d39624 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127855" comment="MozillaFirefox-translations less than 38.8.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127856" comment="MozillaFirefox less than 38.8.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2808</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2808" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" source="CVE"/>
	<description>
	The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.
	</description>
 </metadata>
<!-- c4a992c726ddbf623907944154d39624 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127855" comment="MozillaFirefox-translations less than 38.8.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127856" comment="MozillaFirefox less than 38.8.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2814</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2814" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" source="CVE"/>
	<description>
	Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.
	</description>
 </metadata>
<!-- c4a992c726ddbf623907944154d39624 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009127855" comment="MozillaFirefox-translations less than 38.8.0esr-0.5.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009127856" comment="MozillaFirefox less than 38.8.0esr-0.5.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20162841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-2841</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-2841" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2841" source="CVE"/>
	<description>
	The ne2000_receive function in the NE2000 NIC emulation support (hw/net/ne2000.c) in QEMU before 2.5.1 allows local guest OS administrators to cause a denial of service (infinite loop and QEMU process crash) via crafted values for the PSTART and PSTOP registers, involving ring buffer control.
	</description>
 </metadata>
<!-- 5674a3bc2ab2548e9b2b0ec9973724d0 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128301" comment="xen-devel less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128302" comment="xen-doc-html less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128303" comment="xen-doc-pdf less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128304" comment="xen-doc-ps less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128305" comment="xen-kmp-bigsmp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128306" comment="xen-kmp-debug less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128307" comment="xen-kmp-default less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128308" comment="xen-kmp-kdump less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128309" comment="xen-kmp-kdumppae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128310" comment="xen-kmp-smp less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128311" comment="xen-kmp-vmi less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128312" comment="xen-kmp-vmipae less than 3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128313" comment="xen-libs-32bit less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128314" comment="xen-libs less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128315" comment="xen-tools-domU less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128316" comment="xen-tools-ioemu less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128317" comment="xen-tools less than 3.2.3_17040_46-0.25.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128318" comment="xen less than 3.2.3_17040_46-0.25.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3422</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-3422" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3422" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect availability via vectors related to 2D.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3426</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-3426" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 8u77 and Java SE Embedded 8u77 allows remote attackers to affect confidentiality via vectors related to JCE.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3427</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-3427" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77; Java SE Embedded 8u77; and JRockit R28.3.9 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to JMX.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3443</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-3443" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3443" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to 2D.  NOTE: the previous information is from the April 2016 CPU. Oracle has not commented on third-party claims that this issue allows remote attackers to obtain sensitive information via crafted font data, which triggers an out-of-bounds read.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20163449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-3449</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-3449" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3449" source="CVE"/>
	<description>
	Unspecified vulnerability in Oracle Java SE 6u113, 7u99, and 8u77 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Deployment.
	</description>
 </metadata>
<!-- 133b4d37ec640a121ad2dbcba2704f70 -->
<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
	<criteria operator="OR">
		<criterion test_ref="oval:org.opensuse.security:tst:2009128050" comment="java-1_6_0-ibm-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128051" comment="java-1_6_0-ibm-alsa-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128052" comment="java-1_6_0-ibm-alsa less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128053" comment="java-1_6_0-ibm-devel-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128054" comment="java-1_6_0-ibm-devel less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128055" comment="java-1_6_0-ibm-fonts less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128056" comment="java-1_6_0-ibm-jdbc less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128057" comment="java-1_6_0-ibm-plugin-32bit less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128058" comment="java-1_6_0-ibm-plugin less than 1.6.0_sr16.25-0.11.1"/>
		<criterion test_ref="oval:org.opensuse.security:tst:2009128059" comment="java-1_6_0-ibm less than 1.6.0_sr16.25-0.11.1"/>
	</criteria>
</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164953" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4953</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-4953" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4953" source="CVE"/>
	<description>
	ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (ephemeral-association demobilization) by sending a spoofed crypto-NAK packet with incorrect authentication data at a certain time.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164954" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4954</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-4954" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4954" source="CVE"/>
	<description>
	The process_packet function in ntp_proto.c in ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (peer-variable modification) by sending spoofed packets from many source IP addresses in a certain scenario, as demonstrated by triggering an incorrect leap indication.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4955</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-4955" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4955" source="CVE"/>
	<description>
	ntpd in NTP 4.x before 4.2.8p8, when autokey is enabled, allows remote attackers to cause a denial of service (peer-variable clearing and association outage) by sending (1) a spoofed crypto-NAK packet or (2) a packet with an incorrect MAC value at a certain time.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4956</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-4956" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4956" source="CVE"/>
	<description>
	ntpd in NTP 4.x before 4.2.8p8 allows remote attackers to cause a denial of service (interleaved-mode transition and time change) via a spoofed broadcast packet.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-1548.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20164957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2016-4957</title>
	<affected family="unix">
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for AMD64 and Intel EM64T</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for IBM zSeries 64bit</platform>
		<platform>SUSE Linux Enterprise Server 10 SP4 LTSS for x86</platform>
		<platform>SUSE Linux Enterprise Teradata 10 SP3 for AMD64 and Intel EM64T</platform>
	</affected>
	<reference ref_id="CVE-2016-4957" ref_url="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4957" source="CVE"/>
	<description>
	ntpd in NTP before 4.2.8p8 allows remote attackers to cause a denial of service (daemon crash) via a crypto-NAK packet.  NOTE: this vulnerability exists because of an incorrect fix for CVE-2016-1547.
	</description>
 </metadata>
 <criteria operator="OR">
	<!-- 005fabcea379ebb53725d3077bfa4ba8 -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130928" comment="yast2-ntp-client less than 2.13.18-0.20.1"/>
	</criteria>
	<!-- e7685b9a0cc48dfc1cea383e011b438b -->
	<criteria operator="AND">
		<criterion test_ref="oval:org.opensuse.security:tst:2009036679" comment="sles10-sp4-ltss is installed"/>
		<criteria operator="OR">
			<criterion test_ref="oval:org.opensuse.security:tst:2009130726" comment="ntp-doc less than 4.2.8p8-0.7.1"/>
			<criterion test_ref="oval:org.opensuse.security:tst:2009130727" comment="ntp less than 4.2.8p8-0.7.1"/>
		</criteria>
	</criteria>
 </criteria>
</definition>
 </definitions>
 <tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036679" version="1" comment="sles-release is ==10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077611" version="1" comment="krb5-32bit is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077619" version="1" comment="krb5-64bit is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077620" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077621" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077612" version="1" comment="krb5-client is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077613" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077622" version="1" comment="krb5-devel-64bit is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077614" version="1" comment="krb5-devel is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077623" version="1" comment="krb5-server is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077624" version="1" comment="krb5-x86 is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077615" version="1" comment="krb5 is &lt;1.4.3-19.49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037717" version="1" comment="xorg-x11-devel-32bit is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037719" version="1" comment="xorg-x11-devel-64bit is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037718" version="1" comment="xorg-x11-devel is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037768" version="1" comment="gtk2-devel-64bit is &lt;2.8.11-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037767" version="1" comment="gtk2-devel is &lt;2.8.11-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037827" version="1" comment="NetworkManager-devel is &lt;0.6.4-60.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037828" version="1" comment="NetworkManager-glib is &lt;0.6.4-60.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037829" version="1" comment="NetworkManager-gnome is &lt;0.6.4-60.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037832" version="1" comment="NetworkManager is &lt;0.6.4-60.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037928" version="1" comment="audit-devel is &lt;1.2.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037834" version="1" comment="audit-libs-32bit is &lt;1.2.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037929" version="1" comment="audit-libs-64bit is &lt;1.2.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037835" version="1" comment="audit-libs-python is &lt;1.2.9-12.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037930" version="1" comment="audit-libs-x86 is &lt;1.2.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037836" version="1" comment="audit-libs is &lt;1.2.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037837" version="1" comment="audit is &lt;1.2.9-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037842" version="1" comment="cifs-mount is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037845" version="1" comment="dhcp-client is &lt;3.0.3-23.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037931" version="1" comment="dhcp-devel is &lt;3.0.3-23.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037932" version="1" comment="dhcp-relay is &lt;3.0.3-23.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037933" version="1" comment="dhcp-server is &lt;3.0.3-23.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037846" version="1" comment="dhcp is &lt;3.0.3-23.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037934" version="1" comment="gdb-32bit is &lt;6.6-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037935" version="1" comment="gdb-64bit is &lt;6.6-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037936" version="1" comment="gdb-x86 is &lt;6.6-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037858" version="1" comment="gdb is &lt;6.6-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037862" version="1" comment="glib2-32bit is &lt;2.8.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037937" version="1" comment="glib2-64bit is &lt;2.8.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037863" version="1" comment="glib2-devel is &lt;2.8.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037864" version="1" comment="glib2-doc is &lt;2.8.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037938" version="1" comment="glib2-x86 is &lt;2.8.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037865" version="1" comment="glib2 is &lt;2.8.6-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037867" version="1" comment="gnome-filesystem is &lt;0.1-261.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037873" version="1" comment="gstreamer010-plugins-base-32bit is &lt;0.10.5-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037939" version="1" comment="gstreamer010-plugins-base-64bit is &lt;0.10.5-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037875" version="1" comment="gstreamer010-plugins-base-doc is &lt;0.10.5-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037940" version="1" comment="gstreamer010-plugins-base-x86 is &lt;0.10.5-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037880" version="1" comment="gstreamer010-plugins-base is &lt;0.10.5-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037888" version="1" comment="libbeagle-32bit is &lt;0.2.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037941" version="1" comment="libbeagle-64bit is &lt;0.2.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037942" version="1" comment="libbeagle-x86 is &lt;0.2.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037890" version="1" comment="libbeagle is &lt;0.2.16.3-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037892" version="1" comment="libgail-gnome is &lt;1.1.3-41.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037893" version="1" comment="libgdiplus is &lt;1.2.2-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037943" version="1" comment="libmsrpc-devel is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037944" version="1" comment="libmsrpc is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037896" version="1" comment="libsmbclient-32bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037945" version="1" comment="libsmbclient-64bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037897" version="1" comment="libsmbclient-devel is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037946" version="1" comment="libsmbclient-x86 is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037898" version="1" comment="libsmbclient is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037899" version="1" comment="libtool-32bit is &lt;1.5.22-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037947" version="1" comment="libtool-64bit is &lt;1.5.22-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037948" version="1" comment="libtool-x86 is &lt;1.5.22-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037900" version="1" comment="libtool is &lt;1.5.22-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037913" version="1" comment="samba-32bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037949" version="1" comment="samba-64bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037914" version="1" comment="samba-client-32bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037950" version="1" comment="samba-client-64bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037951" version="1" comment="samba-client-x86 is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037915" version="1" comment="samba-client is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037916" version="1" comment="samba-doc is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037917" version="1" comment="samba-krb-printing is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037918" version="1" comment="samba-pdb is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037952" version="1" comment="samba-python is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037919" version="1" comment="samba-vscan is &lt;0.3.6b-42.49" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037920" version="1" comment="samba-winbind-32bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037953" version="1" comment="samba-winbind-64bit is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037954" version="1" comment="samba-winbind-x86 is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037921" version="1" comment="samba-winbind is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037955" version="1" comment="samba-x86 is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009037922" version="1" comment="samba is &lt;3.0.24-2.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009038583" version="1" comment="php5-suhosin is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009039327" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009039328" version="1" comment="tomcat5-webapps is &lt;5.0.30-27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009039329" version="1" comment="tomcat5 is &lt;5.0.30-27.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056857" version="1" comment="kernel-debug is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056858" version="1" comment="kernel-default is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056859" version="1" comment="kernel-source is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056860" version="1" comment="kernel-syms is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056863" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056861" version="1" comment="kernel-smp is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056862" version="1" comment="kernel-xen is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047590" version="1" comment="slert-release is ==10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056999" version="1" comment="ib-bonding-kmp-rt is &lt;0.9.0_2.6.22.19_0.35-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057000" version="1" comment="ib-bonding-kmp-rt_bigsmp is &lt;0.9.0_2.6.22.19_0.35-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057001" version="1" comment="ib-bonding-kmp-rt_debug is &lt;0.9.0_2.6.22.19_0.35-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057002" version="1" comment="ib-bonding-kmp-rt_timing is &lt;0.9.0_2.6.22.19_0.35-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057003" version="1" comment="kernel-rt is &lt;2.6.22.19-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057004" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057005" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057006" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057007" version="1" comment="kernel-source is &lt;2.6.22.19-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057008" version="1" comment="kernel-syms is &lt;2.6.22.19-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057009" version="1" comment="ofed-cxgb3-NIC-kmp-rt is &lt;1.3_2.6.22.19_0.35-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057010" version="1" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.35-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057011" version="1" comment="ofed-cxgb3-NIC-kmp-rt_debug is &lt;1.3_2.6.22.19_0.35-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057012" version="1" comment="ofed-cxgb3-NIC-kmp-rt_timing is &lt;1.3_2.6.22.19_0.35-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057013" version="1" comment="ofed-doc is &lt;1.3-0.33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057014" version="1" comment="ofed-kmp-rt is &lt;1.3_2.6.22.19_0.35-0.33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057015" version="1" comment="ofed-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.35-0.33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057016" version="1" comment="ofed-kmp-rt_debug is &lt;1.3_2.6.22.19_0.35-0.33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057017" version="1" comment="ofed-kmp-rt_timing is &lt;1.3_2.6.22.19_0.35-0.33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057018" version="1" comment="ofed is &lt;1.3-0.33.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056960" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056964" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056864" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056866" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056867" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056868" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056865" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056869" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056870" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056967" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056968" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057519" version="1" comment="sap-aio-release is ==10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056958" version="1" comment="kernel-default is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056966" version="1" comment="kernel-smp is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056962" version="1" comment="kernel-source is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056963" version="1" comment="kernel-syms is &lt;2.6.16.60-0.42.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040016" version="1" comment="nagios-www is &lt;2.6-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040017" version="1" comment="nagios is &lt;2.6-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009036678" version="1" comment="sled-release is ==10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040288" version="1" comment="LibVNCServer is &lt;0.8.2-31.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040545" version="1" comment="arts-32bit is &lt;1.5.1-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040599" version="1" comment="arts-64bit is &lt;1.5.1-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031089"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040546" version="1" comment="arts-devel is &lt;1.5.1-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040600" version="1" comment="arts-gmcop is &lt;1.5.1-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040601" version="1" comment="arts-x86 is &lt;1.5.1-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040547" version="1" comment="arts is &lt;1.5.1-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040548" version="1" comment="esound-32bit is &lt;0.2.36-19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040602" version="1" comment="esound-64bit is &lt;0.2.36-19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040549" version="1" comment="esound-devel is &lt;0.2.36-19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040603" version="1" comment="esound-x86 is &lt;0.2.36-19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040550" version="1" comment="esound is &lt;0.2.36-19.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040551" version="1" comment="fileshareset is &lt;2.0-84.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040552" version="1" comment="fontconfig-32bit is &lt;2.3.94-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040604" version="1" comment="fontconfig-64bit is &lt;2.3.94-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040553" version="1" comment="fontconfig-devel-32bit is &lt;2.3.94-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040605" version="1" comment="fontconfig-devel-64bit is &lt;2.3.94-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040554" version="1" comment="fontconfig-devel is &lt;2.3.94-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040606" version="1" comment="fontconfig-x86 is &lt;2.3.94-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040555" version="1" comment="fontconfig is &lt;2.3.94-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032251"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040557" version="1" comment="gtk-32bit is &lt;1.2.10-907.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040607" version="1" comment="gtk-64bit is &lt;1.2.10-907.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040558" version="1" comment="gtk-devel is &lt;1.2.10-907.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040608" version="1" comment="gtk-x86 is &lt;1.2.10-907.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040559" version="1" comment="gtk is &lt;1.2.10-907.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040561" version="1" comment="kdebase3-32bit is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040609" version="1" comment="kdebase3-64bit is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040562" version="1" comment="kdebase3-devel is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040610" version="1" comment="kdebase3-extra is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040563" version="1" comment="kdebase3-kdm is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040564" version="1" comment="kdebase3-ksysguardd is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040611" version="1" comment="kdebase3-nsplugin64 is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040565" version="1" comment="kdebase3-nsplugin is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040566" version="1" comment="kdebase3-samba is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040567" version="1" comment="kdebase3-session is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040612" version="1" comment="kdebase3-x86 is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040568" version="1" comment="kdebase3 is &lt;3.5.1-69.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040569" version="1" comment="kdelibs3-32bit is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040613" version="1" comment="kdelibs3-64bit is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040570" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040614" version="1" comment="kdelibs3-arts-64bit is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040615" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040571" version="1" comment="kdelibs3-arts is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040572" version="1" comment="kdelibs3-devel-doc is &lt;3.5.1-49.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040573" version="1" comment="kdelibs3-devel is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040574" version="1" comment="kdelibs3-doc is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040616" version="1" comment="kdelibs3-x86 is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040575" version="1" comment="kdelibs3 is &lt;3.5.1-49.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040576" version="1" comment="kdeutils3-devel is &lt;3.5.1-25.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040617" version="1" comment="kdeutils3-extra is &lt;3.5.1-25.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040577" version="1" comment="kdeutils3-laptop is &lt;3.5.1-25.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040578" version="1" comment="kdeutils3 is &lt;3.5.1-25.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040579" version="1" comment="libwnck-32bit is &lt;2.12.3-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032261"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040618" version="1" comment="libwnck-64bit is &lt;2.12.3-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040580" version="1" comment="libwnck-devel is &lt;2.12.3-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032262"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040619" version="1" comment="libwnck-x86 is &lt;2.12.3-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040581" version="1" comment="libwnck is &lt;2.12.3-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040620" version="1" comment="mysql-Max is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040582" version="1" comment="mysql-client is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040583" version="1" comment="mysql-devel is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040584" version="1" comment="mysql-shared-32bit is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040621" version="1" comment="mysql-shared-64bit is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040622" version="1" comment="mysql-shared-x86 is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040585" version="1" comment="mysql-shared is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040586" version="1" comment="mysql is &lt;5.0.26-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040587" version="1" comment="net-snmp-32bit is &lt;5.3.0.1-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040623" version="1" comment="net-snmp-64bit is &lt;5.3.0.1-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040624" version="1" comment="net-snmp-devel-64bit is &lt;5.3.0.1-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040588" version="1" comment="net-snmp-devel is &lt;5.3.0.1-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040625" version="1" comment="net-snmp-x86 is &lt;5.3.0.1-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040589" version="1" comment="net-snmp is &lt;5.3.0.1-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040590" version="1" comment="perl-SNMP is &lt;5.3.0.1-25.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040591" version="1" comment="qt3-32bit is &lt;3.3.5-58.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030657"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040626" version="1" comment="qt3-64bit is &lt;3.3.5-58.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031096"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040592" version="1" comment="qt3-devel-32bit is &lt;3.3.5-58.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030658"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040627" version="1" comment="qt3-devel-64bit is &lt;3.3.5-58.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040593" version="1" comment="qt3-devel-doc is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040628" version="1" comment="qt3-devel-tools-64bit is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040594" version="1" comment="qt3-devel-tools is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040595" version="1" comment="qt3-devel is &lt;3.3.5-58.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040596" version="1" comment="qt3-examples is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040629" version="1" comment="qt3-extensions is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040597" version="1" comment="qt3-man is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040630" version="1" comment="qt3-mysql-64bit is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040631" version="1" comment="qt3-mysql is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040632" version="1" comment="qt3-postgresql-64bit is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040633" version="1" comment="qt3-postgresql is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040634" version="1" comment="qt3-unixODBC-64bit is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040635" version="1" comment="qt3-unixODBC is &lt;3.3.5-58.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040636" version="1" comment="qt3-x86 is &lt;3.3.5-58.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040598" version="1" comment="qt3 is &lt;3.3.5-58.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040637" version="1" comment="device-mapper-32bit is &lt;1.02.13-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040654" version="1" comment="device-mapper-64bit is &lt;1.02.13-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040655" version="1" comment="device-mapper-x86 is &lt;1.02.13-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040638" version="1" comment="device-mapper is &lt;1.02.13-6.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040639" version="1" comment="gfxboot is &lt;3.2.38-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040641" version="1" comment="kernel-bigsmp is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040656" version="1" comment="kernel-debug is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040642" version="1" comment="kernel-default is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040657" version="1" comment="kernel-iseries64 is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040658" version="1" comment="kernel-kdump is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040659" version="1" comment="kernel-ppc64 is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040643" version="1" comment="kernel-smp is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040644" version="1" comment="kernel-source is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040645" version="1" comment="kernel-syms is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040646" version="1" comment="kernel-xen is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040647" version="1" comment="kernel-xenpae is &lt;2.6.16.46-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040660" version="1" comment="lkcdutils-netdump-server is &lt;7.0.1-22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040648" version="1" comment="lkcdutils is &lt;7.0.1-22.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040649" version="1" comment="ltrace-32bit is &lt;0.4-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040661" version="1" comment="ltrace-64bit is &lt;0.4-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040650" version="1" comment="ltrace is &lt;0.4-31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040652" version="1" comment="rsync is &lt;2.6.8-36.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040653" version="1" comment="sysstat is &lt;6.0.2-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040815" version="1" comment="drbd is &lt;0.7.22-42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040816" version="1" comment="heartbeat-cmpi is &lt;2.0.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040817" version="1" comment="heartbeat-ldirectord is &lt;2.0.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040818" version="1" comment="heartbeat-pils is &lt;2.0.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040819" version="1" comment="heartbeat-stonith is &lt;2.0.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040820" version="1" comment="heartbeat is &lt;2.0.8-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031173"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040821" version="1" comment="ocfs2-tools is &lt;1.2.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040822" version="1" comment="ocfs2console is &lt;1.2.3-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040845" version="1" comment="libpng-devel-32bit is &lt;1.2.8-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040847" version="1" comment="libpng-devel-64bit is &lt;1.2.8-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040846" version="1" comment="libpng-devel is &lt;1.2.8-19.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040930" version="1" comment="cairo-32bit is &lt;1.0.2-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041003" version="1" comment="cairo-64bit is &lt;1.0.2-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040931" version="1" comment="cairo-devel is &lt;1.0.2-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040932" version="1" comment="cairo-doc is &lt;1.0.2-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041004" version="1" comment="cairo-x86 is &lt;1.0.2-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040933" version="1" comment="cairo is &lt;1.0.2-27.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040934" version="1" comment="control-center2-devel is &lt;2.12.3-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040935" version="1" comment="control-center2 is &lt;2.12.3-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040936" version="1" comment="eel-32bit is &lt;2.12.2-18.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041005" version="1" comment="eel-64bit is &lt;2.12.2-18.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040937" version="1" comment="eel-devel is &lt;2.12.2-18.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041006" version="1" comment="eel-x86 is &lt;2.12.2-18.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040938" version="1" comment="eel is &lt;2.12.2-18.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040939" version="1" comment="evolution-data-server-32bit is &lt;1.6.0-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041007" version="1" comment="evolution-data-server-64bit is &lt;1.6.0-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040940" version="1" comment="evolution-data-server-devel is &lt;1.6.0-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041008" version="1" comment="evolution-data-server-x86 is &lt;1.6.0-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040941" version="1" comment="evolution-data-server is &lt;1.6.0-43.53" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040945" version="1" comment="gnome-applets-devel is &lt;2.12.2-51.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040946" version="1" comment="gnome-applets is &lt;2.12.2-51.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040947" version="1" comment="gnome-cups-manager-devel is &lt;0.32cvs20060120-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040948" version="1" comment="gnome-cups-manager is &lt;0.32cvs20060120-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040949" version="1" comment="gnome-desktop-32bit is &lt;2.12.2-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041009" version="1" comment="gnome-desktop-64bit is &lt;2.12.2-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040950" version="1" comment="gnome-desktop-devel is &lt;2.12.2-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041010" version="1" comment="gnome-desktop-x86 is &lt;2.12.2-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040951" version="1" comment="gnome-desktop is &lt;2.12.2-25.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040952" version="1" comment="gnome-keyring-32bit is &lt;0.4.6-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041011" version="1" comment="gnome-keyring-64bit is &lt;0.4.6-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040953" version="1" comment="gnome-keyring-devel is &lt;0.4.6-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041012" version="1" comment="gnome-keyring-x86 is &lt;0.4.6-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040954" version="1" comment="gnome-keyring is &lt;0.4.6-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040956" version="1" comment="gnome-main-menu is &lt;0.9.8-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040957" version="1" comment="gnome-menus-32bit is &lt;2.16.1-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041013" version="1" comment="gnome-menus-64bit is &lt;2.16.1-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040958" version="1" comment="gnome-menus-devel is &lt;2.16.1-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041014" version="1" comment="gnome-menus-x86 is &lt;2.16.1-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040959" version="1" comment="gnome-menus is &lt;2.16.1-38.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040960" version="1" comment="gnome-panel-nld-32bit is &lt;2.12.3-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041015" version="1" comment="gnome-panel-nld-64bit is &lt;2.12.3-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040962" version="1" comment="gnome-panel-nld-doc is &lt;2.12.3-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041016" version="1" comment="gnome-panel-nld-x86 is &lt;2.12.3-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040963" version="1" comment="gnome-panel-nld is &lt;2.12.3-0.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040964" version="1" comment="gnome-vfs2-32bit is &lt;2.12.2-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041017" version="1" comment="gnome-vfs2-64bit is &lt;2.12.2-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040965" version="1" comment="gnome-vfs2-devel is &lt;2.12.2-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040966" version="1" comment="gnome-vfs2-doc is &lt;2.12.2-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041018" version="1" comment="gnome-vfs2-x86 is &lt;2.12.2-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040967" version="1" comment="gnome-vfs2 is &lt;2.12.2-58.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040968" version="1" comment="gstreamer010-32bit is &lt;0.10.4-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041019" version="1" comment="gstreamer010-64bit is &lt;0.10.4-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040970" version="1" comment="gstreamer010-doc is &lt;0.10.4-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041020" version="1" comment="gstreamer010-x86 is &lt;0.10.4-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032377"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040971" version="1" comment="gstreamer010 is &lt;0.10.4-11.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040972" version="1" comment="gtk2-32bit is &lt;2.8.11-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041021" version="1" comment="gtk2-64bit is &lt;2.8.11-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040973" version="1" comment="gtk2-doc is &lt;2.8.11-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041022" version="1" comment="gtk2-x86 is &lt;2.8.11-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040974" version="1" comment="gtk2 is &lt;2.8.11-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040976" version="1" comment="gtkhtml2 is &lt;3.10.0-15.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040978" version="1" comment="libgnomedb-devel is &lt;1.3.91-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040979" version="1" comment="libgnomedb is &lt;1.3.91-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040980" version="1" comment="libgnomesu-devel is &lt;1.0.0-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040981" version="1" comment="libgnomesu is &lt;1.0.0-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040982" version="1" comment="libgnomeui-32bit is &lt;2.12.1-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041023" version="1" comment="libgnomeui-64bit is &lt;2.12.1-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040983" version="1" comment="libgnomeui-devel is &lt;2.12.1-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040984" version="1" comment="libgnomeui-doc is &lt;2.12.1-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041024" version="1" comment="libgnomeui-x86 is &lt;2.12.1-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032379"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040985" version="1" comment="libgnomeui is &lt;2.12.1-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040986" version="1" comment="libgsf-32bit is &lt;1.13.99-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041025" version="1" comment="libgsf-64bit is &lt;1.13.99-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040987" version="1" comment="libgsf-devel is &lt;1.13.99-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040988" version="1" comment="libgsf-doc is &lt;1.13.99-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040989" version="1" comment="libgsf-gnome is &lt;1.13.99-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041026" version="1" comment="libgsf-x86 is &lt;1.13.99-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040990" version="1" comment="libgsf is &lt;1.13.99-13.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040991" version="1" comment="libsoup-32bit is &lt;2.2.90-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041027" version="1" comment="libsoup-64bit is &lt;2.2.90-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032382"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040992" version="1" comment="libsoup-devel-32bit is &lt;2.2.90-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041028" version="1" comment="libsoup-devel-64bit is &lt;2.2.90-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032383"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040993" version="1" comment="libsoup-devel is &lt;2.2.90-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041029" version="1" comment="libsoup-x86 is &lt;2.2.90-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040994" version="1" comment="libsoup is &lt;2.2.90-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040995" version="1" comment="mozilla-nspr-32bit is &lt;4.6.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041030" version="1" comment="mozilla-nspr-64bit is &lt;4.6.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040996" version="1" comment="mozilla-nspr-devel is &lt;4.6.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041031" version="1" comment="mozilla-nspr-x86 is &lt;4.6.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040997" version="1" comment="mozilla-nspr is &lt;4.6.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040998" version="1" comment="nautilus-32bit is &lt;2.12.2-64.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041032" version="1" comment="nautilus-64bit is &lt;2.12.2-64.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009040999" version="1" comment="nautilus-devel is &lt;2.12.2-64.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041033" version="1" comment="nautilus-x86 is &lt;2.12.2-64.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032388"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041000" version="1" comment="nautilus is &lt;2.12.2-64.33" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041001" version="1" comment="vte-devel is &lt;0.11.17-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041002" version="1" comment="vte is &lt;0.11.17-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041199" version="1" comment="OpenIPMI-devel is &lt;2.0.7-35.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041167" version="1" comment="OpenIPMI is &lt;2.0.7-35.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041200" version="1" comment="bootsplash-theme-SuSE-SLES is &lt;3.1-69.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041201" version="1" comment="ddrescue is &lt;1.13_0.0.6-1.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041169" version="1" comment="glibc-32bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041202" version="1" comment="glibc-64bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041170" version="1" comment="glibc-devel-32bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041203" version="1" comment="glibc-devel-64bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041171" version="1" comment="glibc-devel is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041172" version="1" comment="glibc-html is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041173" version="1" comment="glibc-i18ndata is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041174" version="1" comment="glibc-info is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041175" version="1" comment="glibc-locale-32bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041204" version="1" comment="glibc-locale-64bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041205" version="1" comment="glibc-locale-x86 is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041176" version="1" comment="glibc-locale is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041206" version="1" comment="glibc-profile-32bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041207" version="1" comment="glibc-profile-64bit is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041208" version="1" comment="glibc-profile-x86 is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041209" version="1" comment="glibc-profile is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041210" version="1" comment="glibc-x86 is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041177" version="1" comment="glibc is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041178" version="1" comment="grub is &lt;0.97-16.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032394"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041179" version="1" comment="ipmitool is &lt;1.8.9-2.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041180" version="1" comment="ivman is &lt;0.6.9-16.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041211" version="1" comment="ksh-devel is &lt;93r-12.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041181" version="1" comment="ksh is &lt;93r-12.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041182" version="1" comment="lvm2 is &lt;2.02.17-7.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041183" version="1" comment="nscd is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041212" version="1" comment="release-notes-sles is &lt;10-43.51" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041213" version="1" comment="sles-release is &lt;10-15.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041184" version="1" comment="timezone is &lt;2.4-31.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041185" version="1" comment="xorg-x11-Xnest is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041186" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041187" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041214" version="1" comment="xorg-x11-doc is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041188" version="1" comment="xorg-x11-fonts-100dpi is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041189" version="1" comment="xorg-x11-fonts-75dpi is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041190" version="1" comment="xorg-x11-fonts-cyrillic is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041191" version="1" comment="xorg-x11-fonts-scalable is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041192" version="1" comment="xorg-x11-fonts-syriac is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041193" version="1" comment="xorg-x11-libs-32bit is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041215" version="1" comment="xorg-x11-libs-64bit is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041216" version="1" comment="xorg-x11-libs-x86 is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041194" version="1" comment="xorg-x11-libs is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041195" version="1" comment="xorg-x11-man is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041217" version="1" comment="xorg-x11-sdk is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041196" version="1" comment="xorg-x11-server-glx is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041197" version="1" comment="xorg-x11-server is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041198" version="1" comment="xorg-x11 is &lt;6.9.0-50.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041275" version="1" comment="apache2-devel is &lt;2.2.3-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041276" version="1" comment="apache2-doc is &lt;2.2.3-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041277" version="1" comment="apache2-example-pages is &lt;2.2.3-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041278" version="1" comment="apache2-mod_php5 is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041279" version="1" comment="apache2-prefork is &lt;2.2.3-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041280" version="1" comment="apache2-worker is &lt;2.2.3-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041281" version="1" comment="apache2 is &lt;2.2.3-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041282" version="1" comment="php5-bcmath is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041283" version="1" comment="php5-bz2 is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041284" version="1" comment="php5-calendar is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041285" version="1" comment="php5-ctype is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041286" version="1" comment="php5-curl is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041287" version="1" comment="php5-dba is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041288" version="1" comment="php5-dbase is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041289" version="1" comment="php5-devel is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041290" version="1" comment="php5-dom is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041291" version="1" comment="php5-exif is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041292" version="1" comment="php5-fastcgi is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041293" version="1" comment="php5-filepro is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041294" version="1" comment="php5-ftp is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041295" version="1" comment="php5-gd is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041296" version="1" comment="php5-gettext is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041297" version="1" comment="php5-gmp is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041298" version="1" comment="php5-iconv is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041299" version="1" comment="php5-imap is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041300" version="1" comment="php5-ldap is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041301" version="1" comment="php5-mbstring is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041302" version="1" comment="php5-mcrypt is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041303" version="1" comment="php5-mhash is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041304" version="1" comment="php5-mysql is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041305" version="1" comment="php5-mysqli is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041306" version="1" comment="php5-ncurses is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041307" version="1" comment="php5-odbc is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041308" version="1" comment="php5-openssl is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041309" version="1" comment="php5-pcntl is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041310" version="1" comment="php5-pdo is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041311" version="1" comment="php5-pear is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041312" version="1" comment="php5-pgsql is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041313" version="1" comment="php5-posix is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041314" version="1" comment="php5-pspell is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041315" version="1" comment="php5-shmop is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041316" version="1" comment="php5-snmp is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041317" version="1" comment="php5-soap is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041318" version="1" comment="php5-sockets is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041319" version="1" comment="php5-sqlite is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041320" version="1" comment="php5-sysvmsg is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041321" version="1" comment="php5-sysvsem is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041322" version="1" comment="php5-sysvshm is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041323" version="1" comment="php5-tokenizer is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041324" version="1" comment="php5-wddx is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041325" version="1" comment="php5-xmlreader is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041326" version="1" comment="php5-xmlrpc is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041327" version="1" comment="php5-xsl is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041328" version="1" comment="php5-zlib is &lt;5.1.2-29.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009033244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041543" version="1" comment="MozillaFirefox-translations is &lt;2.0.0.2-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041544" version="1" comment="MozillaFirefox is &lt;2.0.0.2-2.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041545" version="1" comment="dejavu is &lt;2.9-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041546" version="1" comment="desktop-data-NLD is &lt;10.1-31.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041547" version="1" comment="mozilla-nss-32bit is &lt;3.11.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041567" version="1" comment="mozilla-nss-64bit is &lt;3.11.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041548" version="1" comment="mozilla-nss-devel is &lt;3.11.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041568" version="1" comment="mozilla-nss-x86 is &lt;3.11.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041550" version="1" comment="mozilla-nss is &lt;3.11.4-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041569" version="1" comment="openmotif-demo is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041570" version="1" comment="openmotif-devel-32bit is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041571" version="1" comment="openmotif-devel-64bit is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041572" version="1" comment="openmotif-devel is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041551" version="1" comment="openmotif-libs-32bit is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041573" version="1" comment="openmotif-libs-64bit is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041574" version="1" comment="openmotif-libs-x86 is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041552" version="1" comment="openmotif-libs is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031087"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041575" version="1" comment="openmotif is &lt;2.2.4-21.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041553" version="1" comment="sax2-gui is &lt;1.7-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041554" version="1" comment="sax2-ident is &lt;1.7-125.38" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041576" version="1" comment="sax2-libsax-devel is &lt;7.1-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041577" version="1" comment="sax2-libsax-java is &lt;7.1-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032461"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041556" version="1" comment="sax2-libsax-perl is &lt;7.1-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041578" version="1" comment="sax2-libsax-python is &lt;7.1-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041557" version="1" comment="sax2-libsax is &lt;7.1-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041558" version="1" comment="sax2-tools is &lt;2.7-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041559" version="1" comment="sax2 is &lt;7.1-125.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041560" version="1" comment="tightvnc is &lt;1.2.9-201.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041561" version="1" comment="xdg-menu is &lt;0.2-66.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041562" version="1" comment="xorg-x11-driver-video-nvidia is &lt;6.9.0-46.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041563" version="1" comment="xorg-x11-driver-video is &lt;6.9.0-46.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041564" version="1" comment="yast2-control-center is &lt;2.13.10-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041565" version="1" comment="yast2-qt is &lt;2.13.82-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041566" version="1" comment="yast2-x11 is &lt;2.13.13-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041840" version="1" comment="CheckHardware is &lt;0.1-988.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041841" version="1" comment="aaa_base is &lt;10-12.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041842" version="1" comment="acl is &lt;2.2.41-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041843" version="1" comment="at is &lt;3.1.8-921.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041844" version="1" comment="attr is &lt;2.4.34-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041845" version="1" comment="autofs is &lt;4.1.4-23.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041846" version="1" comment="autoyast2-installation is &lt;2.13.95-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041847" version="1" comment="autoyast2 is &lt;2.13.95-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042037" version="1" comment="bash-x86 is &lt;3.1-24.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041848" version="1" comment="bash is &lt;3.1-24.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042038" version="1" comment="bind-chrootenv is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042039" version="1" comment="bind-devel-64bit is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042040" version="1" comment="bind-devel is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042041" version="1" comment="bind-doc is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041849" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042042" version="1" comment="bind-libs-64bit is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042043" version="1" comment="bind-libs-x86 is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041850" version="1" comment="bind-libs is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041851" version="1" comment="bind-utils is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042044" version="1" comment="bind is &lt;9.3.4-1.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041852" version="1" comment="binutils-32bit is &lt;2.16.91.0.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042045" version="1" comment="binutils-64bit is &lt;2.16.91.0.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042046" version="1" comment="binutils-x86 is &lt;2.16.91.0.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041853" version="1" comment="binutils is &lt;2.16.91.0.5-23.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042047" version="1" comment="coreutils-x86 is &lt;5.93-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041854" version="1" comment="coreutils is &lt;5.93-22.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041855" version="1" comment="cpio is &lt;2.6-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041856" version="1" comment="cron is &lt;4.1-45.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041857" version="1" comment="dbus-1-32bit is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042048" version="1" comment="dbus-1-64bit is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041858" version="1" comment="dbus-1-devel is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041859" version="1" comment="dbus-1-glib-32bit is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042049" version="1" comment="dbus-1-glib-64bit is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042050" version="1" comment="dbus-1-glib-x86 is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041860" version="1" comment="dbus-1-glib is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041861" version="1" comment="dbus-1-gtk is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042051" version="1" comment="dbus-1-java is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041862" version="1" comment="dbus-1-mono is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041863" version="1" comment="dbus-1-python is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041864" version="1" comment="dbus-1-qt3-32bit is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042052" version="1" comment="dbus-1-qt3-64bit is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041865" version="1" comment="dbus-1-qt3-devel is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042053" version="1" comment="dbus-1-qt3-x86 is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041866" version="1" comment="dbus-1-qt3 is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041867" version="1" comment="dbus-1-x11 is &lt;0.60-33.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042054" version="1" comment="dbus-1-x86 is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041868" version="1" comment="dbus-1 is &lt;0.60-33.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041869" version="1" comment="desktop-translations is &lt;10.1-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041870" version="1" comment="diffutils is &lt;2.8.7-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041871" version="1" comment="dmraid is &lt;0.99_1.0.0rc13-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041872" version="1" comment="dosfstools is &lt;2.11-15.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041873" version="1" comment="e2fsprogs-32bit is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042055" version="1" comment="e2fsprogs-64bit is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041874" version="1" comment="e2fsprogs-devel-32bit is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042056" version="1" comment="e2fsprogs-devel-64bit is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041875" version="1" comment="e2fsprogs-devel is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042057" version="1" comment="e2fsprogs-x86 is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041876" version="1" comment="e2fsprogs is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041877" version="1" comment="filesystem is &lt;10-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041878" version="1" comment="findutils-locate is &lt;4.2.27-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041879" version="1" comment="findutils is &lt;4.2.27-14.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041880" version="1" comment="grep is &lt;2.5.1a-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041881" version="1" comment="hal-32bit is &lt;0.5.6-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042058" version="1" comment="hal-64bit is &lt;0.5.6-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031802"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041882" version="1" comment="hal-devel is &lt;0.5.6-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041883" version="1" comment="hal-gnome is &lt;0.5.6-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042059" version="1" comment="hal-x86 is &lt;0.5.6-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041884" version="1" comment="hal is &lt;0.5.6-33.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041885" version="1" comment="hwinfo-devel is &lt;12.46-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041886" version="1" comment="hwinfo is &lt;12.46-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041887" version="1" comment="insserv is &lt;1.04.0-20.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041888" version="1" comment="iputils is &lt;ss021109-167.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041889" version="1" comment="klogd is &lt;1.4.1-559.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041890" version="1" comment="krb5-32bit is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042060" version="1" comment="krb5-64bit is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042061" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042062" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041891" version="1" comment="krb5-client is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041892" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042063" version="1" comment="krb5-devel-64bit is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041893" version="1" comment="krb5-devel is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042064" version="1" comment="krb5-doc is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042065" version="1" comment="krb5-server is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042066" version="1" comment="krb5-x86 is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041894" version="1" comment="krb5 is &lt;1.4.3-19.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042067" version="1" comment="ldapcpplib-devel is &lt;0.0.4-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041895" version="1" comment="ldapcpplib is &lt;0.0.4-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041896" version="1" comment="libacl-32bit is &lt;2.2.41-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042068" version="1" comment="libacl-64bit is &lt;2.2.41-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042069" version="1" comment="libacl-devel-64bit is &lt;2.2.41-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041897" version="1" comment="libacl-devel is &lt;2.2.41-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042070" version="1" comment="libacl-x86 is &lt;2.2.41-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041898" version="1" comment="libacl is &lt;2.2.41-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041899" version="1" comment="libattr-32bit is &lt;2.4.34-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042071" version="1" comment="libattr-64bit is &lt;2.4.34-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042072" version="1" comment="libattr-devel-64bit is &lt;2.4.34-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041900" version="1" comment="libattr-devel is &lt;2.4.34-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042073" version="1" comment="libattr-x86 is &lt;2.4.34-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041901" version="1" comment="libattr is &lt;2.4.34-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041902" version="1" comment="libcom_err-32bit is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042074" version="1" comment="libcom_err-64bit is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042075" version="1" comment="libcom_err-x86 is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041903" version="1" comment="libcom_err is &lt;1.38-25.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042076" version="1" comment="liby2util-devel is &lt;2.13.8-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041904" version="1" comment="liby2util is &lt;2.13.8-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042077" version="1" comment="libzypp-devel is &lt;2.15.10-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041905" version="1" comment="libzypp-zmd-backend is &lt;7.1.1.0_0.8-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041906" version="1" comment="libzypp is &lt;2.15.10-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042078" version="1" comment="lilo is &lt;10.1.22-1.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041907" version="1" comment="lilo is &lt;22.7-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041908" version="1" comment="limal-bootloader is &lt;1.1.50-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041909" version="1" comment="limal-perl is &lt;1.1.56-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041910" version="1" comment="limal is &lt;1.1.56-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041911" version="1" comment="mailx is &lt;11.25-14.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041912" version="1" comment="mcelog is &lt;0.7-2.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041913" version="1" comment="mdadm is &lt;2.6-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041914" version="1" comment="microcode_ctl is &lt;1.15-12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041915" version="1" comment="mkinitrd is &lt;1.2-106.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041916" version="1" comment="module-init-tools is &lt;3.2.2-32.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041917" version="1" comment="multipath-tools is &lt;0.4.7-34.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041918" version="1" comment="ncurses-32bit is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042079" version="1" comment="ncurses-64bit is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041919" version="1" comment="ncurses-devel-32bit is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042080" version="1" comment="ncurses-devel-64bit is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041920" version="1" comment="ncurses-devel is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042081" version="1" comment="ncurses-x86 is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032624"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041921" version="1" comment="ncurses is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041922" version="1" comment="nfs-utils is &lt;1.0.7-36.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041923" version="1" comment="nfsidmap is &lt;0.12-16.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042082" version="1" comment="openldap2-back-meta is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042083" version="1" comment="openldap2-back-meta is &lt;2.3.32-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042084" version="1" comment="openldap2-back-perl is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042085" version="1" comment="openldap2-back-perl is &lt;2.3.32-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041924" version="1" comment="openldap2-client-32bit is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042086" version="1" comment="openldap2-client-64bit is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042087" version="1" comment="openldap2-client-x86 is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041925" version="1" comment="openldap2-client is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041926" version="1" comment="openldap2-devel-32bit is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042088" version="1" comment="openldap2-devel-64bit is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041927" version="1" comment="openldap2-devel is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041928" version="1" comment="openldap2 is &lt;2.3.32-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042089" version="1" comment="openldap2 is &lt;2.3.32-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042090" version="1" comment="openssh-askpass-gnome is &lt;4.2p1-18.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041929" version="1" comment="openssh-askpass is &lt;4.2p1-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041930" version="1" comment="openssh is &lt;4.2p1-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041931" version="1" comment="pam-32bit is &lt;0.99.6.3-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042091" version="1" comment="pam-64bit is &lt;0.99.6.3-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042092" version="1" comment="pam-devel-32bit is &lt;0.99.6.3-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042093" version="1" comment="pam-devel-64bit is &lt;0.99.6.3-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041932" version="1" comment="pam-devel is &lt;0.99.6.3-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041933" version="1" comment="pam-modules-32bit is &lt;10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042094" version="1" comment="pam-modules-64bit is &lt;10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042095" version="1" comment="pam-modules-x86 is &lt;10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041934" version="1" comment="pam-modules is &lt;10-2.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042096" version="1" comment="pam-x86 is &lt;0.99.6.3-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041935" version="1" comment="pam is &lt;0.99.6.3-28.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041936" version="1" comment="parted-32bit is &lt;1.6.25.1-15.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042097" version="1" comment="parted-64bit is &lt;1.6.25.1-15.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042098" version="1" comment="parted-devel is &lt;1.6.25.1-15.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042099" version="1" comment="parted-x86 is &lt;1.6.25.1-15.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041937" version="1" comment="parted is &lt;1.6.25.1-15.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042100" version="1" comment="pciutils-devel-32bit is &lt;2.2.4-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042101" version="1" comment="pciutils-devel-64bit is &lt;2.2.4-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042102" version="1" comment="pciutils-devel is &lt;2.2.4-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041938" version="1" comment="pciutils is &lt;2.2.4-16.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041939" version="1" comment="pcsc-lite-devel is &lt;1.2.9_beta9-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041940" version="1" comment="pcsc-lite is &lt;1.2.9_beta9-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041941" version="1" comment="perl-Bootloader is &lt;0.4.15-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041942" version="1" comment="permissions is &lt;2007.2.15-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041943" version="1" comment="popt-32bit is &lt;1.7-271.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042103" version="1" comment="popt-64bit is &lt;1.7-271.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041944" version="1" comment="popt-devel-32bit is &lt;1.7-271.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042104" version="1" comment="popt-devel-64bit is &lt;1.7-271.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041945" version="1" comment="popt-devel is &lt;1.7-271.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042105" version="1" comment="popt-x86 is &lt;1.7-271.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041946" version="1" comment="popt is &lt;1.7-271.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041947" version="1" comment="portmap is &lt;5beta-749.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041948" version="1" comment="postfix is &lt;2.2.9-10.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042106" version="1" comment="powersave-devel is &lt;0.12.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041949" version="1" comment="powersave-libs-32bit is &lt;0.12.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042107" version="1" comment="powersave-libs-64bit is &lt;0.12.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042108" version="1" comment="powersave-libs-x86 is &lt;0.12.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041950" version="1" comment="powersave-libs is &lt;0.12.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041951" version="1" comment="powersave is &lt;0.12.26-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041952" version="1" comment="procinfo is &lt;18-55.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041953" version="1" comment="pwdutils is &lt;3.0.7.1-17.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041954" version="1" comment="readline-32bit is &lt;5.1-24.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042109" version="1" comment="readline-64bit is &lt;5.1-24.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041955" version="1" comment="readline-devel-32bit is &lt;5.1-24.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042110" version="1" comment="readline-devel-64bit is &lt;5.1-24.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041956" version="1" comment="readline-devel is &lt;5.1-24.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042111" version="1" comment="readline-x86 is &lt;5.1-24.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041957" version="1" comment="readline is &lt;5.1-24.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041958" version="1" comment="reiserfs is &lt;3.6.19-19.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041959" version="1" comment="rpm-devel is &lt;4.4.2-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041960" version="1" comment="rpm-python is &lt;4.4.2-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041961" version="1" comment="rpm is &lt;4.4.2-43.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041962" version="1" comment="rug is &lt;7.2.0.0-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041964" version="1" comment="scpm is &lt;1.1.3-18.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041965" version="1" comment="screen is &lt;4.0.2-62.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030655"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041966" version="1" comment="scsi is &lt;1.7_2.36_1.19_0.17_0.97-12.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041967" version="1" comment="sed is &lt;4.1.4-17.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041969" version="1" comment="sudo is &lt;1.6.8p12-18.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041970" version="1" comment="suseRegister is &lt;1.2-9.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041971" version="1" comment="sysconfig is &lt;0.50.9-13.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041972" version="1" comment="sysfsutils-32bit is &lt;1.3.0-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042112" version="1" comment="sysfsutils-64bit is &lt;1.3.0-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042113" version="1" comment="sysfsutils-x86 is &lt;1.3.0-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041973" version="1" comment="sysfsutils is &lt;1.3.0-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041974" version="1" comment="syslinux is &lt;3.11-20.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042114" version="1" comment="syslogd is &lt;1.4.1-559.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041975" version="1" comment="sysvinit is &lt;2.86-21.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041976" version="1" comment="terminfo is &lt;5.5-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041977" version="1" comment="udev is &lt;085-30.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041978" version="1" comment="ulimit is &lt;1.1-146.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041979" version="1" comment="update-desktop-files is &lt;10.1-40.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041980" version="1" comment="util-linux is &lt;2.12r-35.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041981" version="1" comment="wireless-tools is &lt;28pre13-22.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042115" version="1" comment="xfsprogs-devel is &lt;2.8.16-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032648"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041982" version="1" comment="xfsprogs is &lt;2.8.16-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042116" version="1" comment="xntp-doc is &lt;4.2.0a-70.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041983" version="1" comment="xntp is &lt;4.2.0a-70.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042117" version="1" comment="xscsi is &lt;1.7_2.36_1.19_0.17_0.97-12.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041984" version="1" comment="yast2-backup is &lt;2.13.5-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041985" version="1" comment="yast2-bootloader is &lt;2.13.97-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042118" version="1" comment="yast2-core-devel is &lt;2.13.39-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041986" version="1" comment="yast2-core is &lt;2.13.39-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041987" version="1" comment="yast2-country is &lt;2.13.52-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042119" version="1" comment="yast2-devel is &lt;2.13.104-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041988" version="1" comment="yast2-firewall is &lt;2.13.15-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041989" version="1" comment="yast2-hardware-detection is &lt;2.13.7-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041990" version="1" comment="yast2-inetd is &lt;2.13.8-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041991" version="1" comment="yast2-installation is &lt;2.13.192-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041992" version="1" comment="yast2-irda is &lt;2.13.3-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041993" version="1" comment="yast2-kerberos-client is &lt;2.13.11-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041994" version="1" comment="yast2-ldap-client is &lt;2.13.27-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041995" version="1" comment="yast2-ldap is &lt;2.13.5-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041996" version="1" comment="yast2-mail-aliases is &lt;2.13.8-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041997" version="1" comment="yast2-mail is &lt;2.13.8-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041998" version="1" comment="yast2-ncurses is &lt;2.13.66-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009041999" version="1" comment="yast2-network is &lt;2.13.98-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042000" version="1" comment="yast2-nfs-client is &lt;2.13.4-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042001" version="1" comment="yast2-nis-client is &lt;2.13.8-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042002" version="1" comment="yast2-ntp-client is &lt;2.13.17-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042003" version="1" comment="yast2-online-update-frontend is &lt;2.13.59-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042004" version="1" comment="yast2-online-update is &lt;2.13.59-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042005" version="1" comment="yast2-packager is &lt;2.13.175-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042006" version="1" comment="yast2-pam is &lt;2.13.5-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042007" version="1" comment="yast2-perl-bindings is &lt;2.13.11-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042008" version="1" comment="yast2-pkg-bindings is &lt;2.13.117-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042009" version="1" comment="yast2-power-management is &lt;2.13.9-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042010" version="1" comment="yast2-powertweak is &lt;2.13.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042011" version="1" comment="yast2-printer is &lt;2.13.32-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042012" version="1" comment="yast2-profile-manager is &lt;2.13.6-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042013" version="1" comment="yast2-repair is &lt;2.13.10-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042014" version="1" comment="yast2-restore is &lt;2.13.2-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042015" version="1" comment="yast2-runlevel is &lt;2.13.11-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042016" version="1" comment="yast2-samba-client is &lt;2.13.36-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042017" version="1" comment="yast2-schema is &lt;2.13.5-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042018" version="1" comment="yast2-security is &lt;2.13.7-0.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042019" version="1" comment="yast2-slp is &lt;2.13.4-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042120" version="1" comment="yast2-storage-devel is &lt;2.13.94-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042121" version="1" comment="yast2-storage-evms is &lt;2.13.94-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042020" version="1" comment="yast2-storage-lib is &lt;2.13.94-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042021" version="1" comment="yast2-storage is &lt;2.13.94-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042022" version="1" comment="yast2-support is &lt;2.13.6-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042023" version="1" comment="yast2-sysconfig is &lt;2.13.8-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042024" version="1" comment="yast2-theme-NLD is &lt;0.4.5-3.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042025" version="1" comment="yast2-trans-stats is &lt;2.11.0-21.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042026" version="1" comment="yast2-transfer is &lt;2.13.4-0.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042027" version="1" comment="yast2-tune is &lt;2.13.12-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034660"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042029" version="1" comment="yast2-update is &lt;2.13.52-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042030" version="1" comment="yast2-users is &lt;2.13.55-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042031" version="1" comment="yast2-vm is &lt;2.13.77-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042032" version="1" comment="yast2-xml is &lt;2.13.4-0.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042033" version="1" comment="yast2 is &lt;2.13.104-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042122" version="1" comment="zmd-devel is &lt;7.2.0.0-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042034" version="1" comment="zmd-inventory is &lt;7.2.0-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042035" version="1" comment="zmd is &lt;7.2.0.0-0.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042036" version="1" comment="zypper is &lt;0.6.17-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042151" version="1" comment="nss_ldap-32bit is &lt;246-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042155" version="1" comment="nss_ldap-64bit is &lt;246-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042156" version="1" comment="nss_ldap-x86 is &lt;246-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042152" version="1" comment="nss_ldap is &lt;246-14.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042153" version="1" comment="pam_ldap-32bit is &lt;180-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042157" version="1" comment="pam_ldap-64bit is &lt;180-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042158" version="1" comment="pam_ldap-x86 is &lt;180-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042154" version="1" comment="pam_ldap is &lt;180-13.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042160" version="1" comment="NetworkManager-kde is &lt;0.1r588481-1.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042194" version="1" comment="kdenetwork3-IRC is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042179" version="1" comment="kdenetwork3-InstantMessenger is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042195" version="1" comment="kdenetwork3-dialup is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042196" version="1" comment="kdenetwork3-lan is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042197" version="1" comment="kdenetwork3-lisa is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042180" version="1" comment="kdenetwork3-news is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042198" version="1" comment="kdenetwork3-query is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042181" version="1" comment="kdenetwork3-vnc is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042199" version="1" comment="kdenetwork3-wireless is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042182" version="1" comment="kdenetwork3 is &lt;3.5.1-32.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042183" version="1" comment="kdepim3-devel is &lt;3.5.1-41.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042184" version="1" comment="kdepim3-kpilot is &lt;3.5.1-41.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042186" version="1" comment="kdepim3-networkstatus is &lt;3.5.1-41.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042187" version="1" comment="kdepim3-sync is &lt;3.5.1-41.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042200" version="1" comment="kdepim3-time-management is &lt;3.5.1-41.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042188" version="1" comment="kdepim3 is &lt;3.5.1-41.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009042190" version="1" comment="kinternet is &lt;0.75-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043025" version="1" comment="mysql-Max is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043028" version="1" comment="mysql-bench is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043016" version="1" comment="mysql-client is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043017" version="1" comment="mysql-devel is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043018" version="1" comment="mysql-shared-32bit is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043026" version="1" comment="mysql-shared-64bit is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043027" version="1" comment="mysql-shared-x86 is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043019" version="1" comment="mysql-shared is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043020" version="1" comment="mysql is &lt;5.0.26-12.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043038" version="1" comment="lynx is &lt;2.8.5-51.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072989" version="1" comment="NetworkManager-devel is &lt;0.6.6-0.21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072990" version="1" comment="NetworkManager-glib is &lt;0.6.6-0.21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072991" version="1" comment="NetworkManager-gnome is &lt;0.6.6-0.21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072992" version="1" comment="NetworkManager is &lt;0.6.6-0.21.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072993" version="1" comment="wpa_supplicant is &lt;0.4.8-14.29.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104296" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104297" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104298" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104299" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104300" version="1" comment="openssl is &lt;0.9.8a-18.45.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073451" version="1" comment="openssl-32bit is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073455" version="1" comment="openssl-64bit is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073452" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073456" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073453" version="1" comment="openssl-devel is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073457" version="1" comment="openssl-doc is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073458" version="1" comment="openssl-x86 is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073454" version="1" comment="openssl is &lt;0.9.8a-18.64.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043262" version="1" comment="dhcp-devel is &lt;3.0.3-23.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043263" version="1" comment="dhcp-relay is &lt;3.0.3-23.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009043264" version="1" comment="dhcp-server is &lt;3.0.3-23.52" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009034918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077767" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077768" version="1" comment="php5-bcmath is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077769" version="1" comment="php5-bz2 is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077770" version="1" comment="php5-calendar is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077771" version="1" comment="php5-ctype is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077772" version="1" comment="php5-curl is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077773" version="1" comment="php5-dba is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077774" version="1" comment="php5-dbase is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077775" version="1" comment="php5-devel is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077776" version="1" comment="php5-dom is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077777" version="1" comment="php5-exif is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077778" version="1" comment="php5-fastcgi is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077779" version="1" comment="php5-ftp is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077780" version="1" comment="php5-gd is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077781" version="1" comment="php5-gettext is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077782" version="1" comment="php5-gmp is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077783" version="1" comment="php5-hash is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077784" version="1" comment="php5-iconv is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077785" version="1" comment="php5-imap is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077786" version="1" comment="php5-json is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077787" version="1" comment="php5-ldap is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077788" version="1" comment="php5-mbstring is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077789" version="1" comment="php5-mcrypt is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077790" version="1" comment="php5-mhash is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077791" version="1" comment="php5-mysql is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077792" version="1" comment="php5-ncurses is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077793" version="1" comment="php5-odbc is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077794" version="1" comment="php5-openssl is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077795" version="1" comment="php5-pcntl is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077796" version="1" comment="php5-pdo is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077797" version="1" comment="php5-pear is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077798" version="1" comment="php5-pgsql is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077799" version="1" comment="php5-posix is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077800" version="1" comment="php5-pspell is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077801" version="1" comment="php5-shmop is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077802" version="1" comment="php5-snmp is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077803" version="1" comment="php5-soap is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077804" version="1" comment="php5-sockets is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077805" version="1" comment="php5-sqlite is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077806" version="1" comment="php5-suhosin is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077807" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077808" version="1" comment="php5-sysvsem is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077809" version="1" comment="php5-sysvshm is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077810" version="1" comment="php5-tokenizer is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077811" version="1" comment="php5-wddx is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077812" version="1" comment="php5-xmlreader is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077813" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077814" version="1" comment="php5-xsl is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077815" version="1" comment="php5-zlib is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063222" version="1" comment="ib-bonding-kmp-default is &lt;0.9.0_2.6.16.60_0.69.5-1.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063223" version="1" comment="oracleasm-kmp-default is &lt;2.0.5_2.6.16.60_0.69.5-7.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047000" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr11-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047001" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr11-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047002" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr11-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047003" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr11-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047431" version="1" comment="slepos-release is ==10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009032190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047432" version="1" comment="yast2-core-devel is &lt;2.13.41-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047430" version="1" comment="yast2-core is &lt;2.13.41-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047494" version="1" comment="apache2-devel is &lt;2.2.3-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047495" version="1" comment="apache2-doc is &lt;2.2.3-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047496" version="1" comment="apache2-example-pages is &lt;2.2.3-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047497" version="1" comment="apache2-prefork is &lt;2.2.3-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047498" version="1" comment="apache2-worker is &lt;2.2.3-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047499" version="1" comment="apache2 is &lt;2.2.3-16.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047566" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047574" version="1" comment="kernel-debug is &lt;2.6.16.60-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047572" version="1" comment="kernel-xen is &lt;2.6.16.60-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047573" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047591" version="1" comment="kernel-rt is &lt;2.6.22.19-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047592" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047593" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047594" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047595" version="1" comment="kernel-source is &lt;2.6.22.19-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047596" version="1" comment="kernel-syms is &lt;2.6.22.19-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047618" version="1" comment="ghostscript-fonts-rus is &lt;8.15.4-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047619" version="1" comment="ghostscript-omni is &lt;8.15.4-16.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047620" version="1" comment="libgimpprint-devel is &lt;4.2.7-62.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073121" version="1" comment="apache2-devel is &lt;2.2.3-16.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073122" version="1" comment="apache2-doc is &lt;2.2.3-16.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073123" version="1" comment="apache2-example-pages is &lt;2.2.3-16.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073124" version="1" comment="apache2-prefork is &lt;2.2.3-16.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073125" version="1" comment="apache2-worker is &lt;2.2.3-16.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073126" version="1" comment="apache2 is &lt;2.2.3-16.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104301" version="1" comment="apache2-devel is &lt;2.2.3-16.32.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104302" version="1" comment="apache2-doc is &lt;2.2.3-16.32.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104303" version="1" comment="apache2-example-pages is &lt;2.2.3-16.32.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104304" version="1" comment="apache2-prefork is &lt;2.2.3-16.32.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104305" version="1" comment="apache2-worker is &lt;2.2.3-16.32.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104306" version="1" comment="apache2 is &lt;2.2.3-16.32.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047646" version="1" comment="gecko-sdk is &lt;1.8.0.14eol-0.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047666" version="1" comment="gecko-sdk is &lt;1.8.0.14eol-0.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009047941" version="1" comment="mailman is &lt;2.1.7-15.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060834" version="1" comment="kernel-default is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060838" version="1" comment="kernel-source is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060839" version="1" comment="kernel-syms is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048003" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060835" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060836" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060837" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048007" version="1" comment="kernel-debug is &lt;2.6.16.60-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048010" version="1" comment="kernel-xen is &lt;2.6.16.60-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048011" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048029" version="1" comment="kernel-debug is &lt;2.6.16.60-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048030" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048028" version="1" comment="kernel-xen is &lt;2.6.16.60-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060840" version="1" comment="kernel-debug is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060841" version="1" comment="kernel-smp is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060842" version="1" comment="kernel-xen is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060843" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060845" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060846" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060847" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060844" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048089" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048090" version="1" comment="php5-bcmath is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048091" version="1" comment="php5-bz2 is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048092" version="1" comment="php5-calendar is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048093" version="1" comment="php5-ctype is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048094" version="1" comment="php5-curl is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048095" version="1" comment="php5-dba is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048096" version="1" comment="php5-dbase is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048097" version="1" comment="php5-devel is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048098" version="1" comment="php5-dom is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048099" version="1" comment="php5-exif is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048100" version="1" comment="php5-fastcgi is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048101" version="1" comment="php5-ftp is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048102" version="1" comment="php5-gd is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048103" version="1" comment="php5-gettext is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048104" version="1" comment="php5-gmp is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048105" version="1" comment="php5-iconv is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048106" version="1" comment="php5-imap is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048108" version="1" comment="php5-ldap is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048109" version="1" comment="php5-mbstring is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048110" version="1" comment="php5-mcrypt is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048111" version="1" comment="php5-mhash is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048112" version="1" comment="php5-mysql is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048113" version="1" comment="php5-ncurses is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048114" version="1" comment="php5-odbc is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048115" version="1" comment="php5-openssl is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048116" version="1" comment="php5-pcntl is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048117" version="1" comment="php5-pdo is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048118" version="1" comment="php5-pear is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048119" version="1" comment="php5-pgsql is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048120" version="1" comment="php5-posix is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048121" version="1" comment="php5-pspell is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048122" version="1" comment="php5-shmop is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048123" version="1" comment="php5-snmp is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048124" version="1" comment="php5-soap is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048125" version="1" comment="php5-sockets is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048126" version="1" comment="php5-sqlite is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048127" version="1" comment="php5-suhosin is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048128" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048129" version="1" comment="php5-sysvsem is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048130" version="1" comment="php5-sysvshm is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048137" version="1" comment="php5-tidy is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048131" version="1" comment="php5-tokenizer is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048132" version="1" comment="php5-wddx is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048133" version="1" comment="php5-xmlreader is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048134" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048135" version="1" comment="php5-xsl is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048136" version="1" comment="php5-zlib is &lt;5.2.5-9.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048155" version="1" comment="qemu is &lt;0.8.2-37.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048182" version="1" comment="net-snmp-devel-64bit is &lt;5.3.0.1-25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048175" version="1" comment="net-snmp-devel is &lt;5.3.0.1-25.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048259" version="1" comment="ImageMagick-Magick++-devel is &lt;6.2.5-16.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048255" version="1" comment="ImageMagick-Magick++ is &lt;6.2.5-16.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048256" version="1" comment="ImageMagick-devel is &lt;6.2.5-16.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048257" version="1" comment="ImageMagick is &lt;6.2.5-16.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048258" version="1" comment="perl-PerlMagick is &lt;6.2.5-16.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048331" version="1" comment="libmsrpc-devel is &lt;3.0.28-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048332" version="1" comment="libmsrpc is &lt;3.0.28-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048315" version="1" comment="libsmbclient-devel is &lt;3.0.28-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048342" version="1" comment="libsmbsharemodes-devel is &lt;3.0.28-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048343" version="1" comment="libsmbsharemodes is &lt;3.0.28-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048338" version="1" comment="samba-python is &lt;3.0.28-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048350" version="1" comment="evolution-devel is &lt;2.6.0-49.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048351" version="1" comment="evolution-pilot is &lt;2.6.0-49.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048352" version="1" comment="evolution is &lt;2.6.0-49.79" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048362" version="1" comment="ruby-devel is &lt;1.8.4-17.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048363" version="1" comment="ruby-doc-html is &lt;1.8.4-17.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048364" version="1" comment="ruby-doc-ri is &lt;1.8.4-17.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048365" version="1" comment="ruby-examples is &lt;1.8.4-17.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048366" version="1" comment="ruby-test-suite is &lt;1.8.4-17.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048367" version="1" comment="ruby-tk is &lt;1.8.4-17.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048361" version="1" comment="ruby is &lt;1.8.4-17.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048424" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-27.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048425" version="1" comment="tomcat5-webapps is &lt;5.0.30-27.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048426" version="1" comment="tomcat5 is &lt;5.0.30-27.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048435" version="1" comment="cvs2svn is &lt;1.3.0-30.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048433" version="1" comment="subversion-devel is &lt;1.3.1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048436" version="1" comment="subversion-python is &lt;1.3.1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048437" version="1" comment="subversion-server is &lt;1.3.1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048438" version="1" comment="subversion-tools is &lt;1.3.1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048434" version="1" comment="subversion is &lt;1.3.1-1.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048439" version="1" comment="viewcvs is &lt;1.0.5-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048447" version="1" comment="kernel-debug is &lt;2.6.16.60-0.37_f594963d" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048448" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.37_f594963d" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048446" version="1" comment="kernel-xen is &lt;2.6.16.60-0.37_f594963d" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048452" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.37_f594963d" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048479" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.60" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048482" version="1" comment="xgl is &lt;cvs_060522-0.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033770" version="1" comment="clamav is &lt;0.94-0.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070508" version="1" comment="glibc-32bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070518" version="1" comment="glibc-64bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070509" version="1" comment="glibc-devel-32bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070519" version="1" comment="glibc-devel-64bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070510" version="1" comment="glibc-devel is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070511" version="1" comment="glibc-html is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070512" version="1" comment="glibc-i18ndata is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070513" version="1" comment="glibc-info is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070514" version="1" comment="glibc-locale-32bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070520" version="1" comment="glibc-locale-64bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070521" version="1" comment="glibc-locale-x86 is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070515" version="1" comment="glibc-locale is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070522" version="1" comment="glibc-profile-32bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070523" version="1" comment="glibc-profile-64bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070524" version="1" comment="glibc-profile-x86 is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070525" version="1" comment="glibc-profile is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070526" version="1" comment="glibc-x86 is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070516" version="1" comment="glibc is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070517" version="1" comment="nscd is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070527" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070528" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070529" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070530" version="1" comment="glibc-dceext is &lt;2.4-31.77.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048606" version="1" comment="bind-chrootenv is &lt;9.3.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048607" version="1" comment="bind-devel-64bit is &lt;9.3.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048608" version="1" comment="bind-devel is &lt;9.3.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048609" version="1" comment="bind-doc is &lt;9.3.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048612" version="1" comment="bind is &lt;9.3.4-1.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035194" version="1" comment="namazu-cgi is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035195" version="1" comment="namazu-devel is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009035196" version="1" comment="namazu is &lt;2.0.18-24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048728" version="1" comment="kernel-rt is &lt;2.6.22.19-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048729" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048730" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048731" version="1" comment="kernel-source is &lt;2.6.22.19-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048732" version="1" comment="kernel-syms is &lt;2.6.22.19-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048740" version="1" comment="kernel-debug is &lt;2.6.16.60-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048741" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048738" version="1" comment="kernel-xen is &lt;2.6.16.60-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048739" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048746" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048750" version="1" comment="kernel-debug is &lt;2.6.16.60-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048751" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048754" version="1" comment="kernel-xen is &lt;2.6.16.60-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048755" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048782" version="1" comment="python-demo is &lt;2.4.2-18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048776" version="1" comment="python-devel is &lt;2.4.2-18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048783" version="1" comment="python-doc-pdf is &lt;2.4.2-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048784" version="1" comment="python-doc is &lt;2.4.2-18.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048785" version="1" comment="python-idle is &lt;2.4.2-18.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009035999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048811" version="1" comment="speex-32bit is &lt;1.0.5-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048814" version="1" comment="speex-64bit is &lt;1.0.5-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048812" version="1" comment="speex-devel is &lt;1.0.5-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030839"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048815" version="1" comment="speex-x86 is &lt;1.0.5-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048813" version="1" comment="speex is &lt;1.0.5-14.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048819" version="1" comment="vorbis-tools is &lt;1.1.1-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048841" version="1" comment="xine-devel is &lt;1.1.1-24.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048844" version="1" comment="xine-extra is &lt;1.1.1-24.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048842" version="1" comment="xine-lib-32bit is &lt;1.1.1-24.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048845" version="1" comment="xine-lib-64bit is &lt;1.1.1-24.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048846" version="1" comment="xine-lib-x86 is &lt;1.1.1-24.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048843" version="1" comment="xine-lib is &lt;1.1.1-24.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048847" version="1" comment="xine-ui is &lt;0.99.4-32.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009048889" version="1" comment="rdesktop is &lt;1.4.1-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049011" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049012" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049013" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049014" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13-0.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049015" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049016" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049017" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049018" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049024" version="1" comment="kernel-debug is &lt;2.6.16.60-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049025" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049023" version="1" comment="kernel-xen is &lt;2.6.16.60-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049027" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049036" version="1" comment="emacs-el is &lt;21.3-224.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031212"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049037" version="1" comment="emacs-nox is &lt;21.3-224.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049043" version="1" comment="xemacs-packages-el is &lt;20051208-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049041" version="1" comment="xemacs-packages-info is &lt;20051208-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049042" version="1" comment="xemacs-packages is &lt;20051208-18.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049055" version="1" comment="opensc-32bit is &lt;0.9.6-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049058" version="1" comment="opensc-devel is &lt;0.9.6-17.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049060" version="1" comment="opensc-32bit is &lt;0.9.6-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049063" version="1" comment="opensc-devel is &lt;0.9.6-17.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049253" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049254" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049250" version="1" comment="libtiff-devel is &lt;3.8.2-5.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049256" version="1" comment="mtr-gtk is &lt;0.69-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049257" version="1" comment="mtr is &lt;0.69-18.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049267" version="1" comment="apache2-devel is &lt;2.2.3-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049268" version="1" comment="apache2-doc is &lt;2.2.3-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049269" version="1" comment="apache2-example-pages is &lt;2.2.3-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049270" version="1" comment="apache2-prefork is &lt;2.2.3-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049271" version="1" comment="apache2-worker is &lt;2.2.3-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049272" version="1" comment="apache2 is &lt;2.2.3-16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049296" version="1" comment="bluez-cups is &lt;2.24-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049297" version="1" comment="bluez-libs is &lt;2.24-12.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049298" version="1" comment="bluez-utils is &lt;2.24-17.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049299" version="1" comment="vsftpd is &lt;2.0.4-19.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070138" version="1" comment="apache2-mod_auth_mysql is &lt;3.0.0-14.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049326" version="1" comment="imlib2-devel is &lt;1.2.1-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049327" version="1" comment="imlib2-loaders is &lt;1.2.1-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049328" version="1" comment="imlib2 is &lt;1.2.1-17.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049363" version="1" comment="gvim is &lt;6.4.6-19.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049364" version="1" comment="clamav is &lt;0.93.1-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049365" version="1" comment="clamav is &lt;0.93.3-0.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049400" version="1" comment="kernel-rt is &lt;2.6.22.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049401" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049402" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049403" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049404" version="1" comment="kernel-source is &lt;2.6.22.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049405" version="1" comment="kernel-syms is &lt;2.6.22.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049462" version="1" comment="finch-devel is &lt;2.3.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049459" version="1" comment="finch is &lt;2.3.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049463" version="1" comment="libpurple-devel is &lt;2.3.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049460" version="1" comment="libpurple is &lt;2.3.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049464" version="1" comment="pidgin-devel is &lt;2.3.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049461" version="1" comment="pidgin is &lt;2.3.1-10.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049555" version="1" comment="openldap2-back-meta is &lt;2.3.32-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049556" version="1" comment="openldap2-back-perl is &lt;2.3.32-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049575" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049576" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049577" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049578" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr12-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049630" version="1" comment="ethereal-devel is &lt;0.10.14-16.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049647" version="1" comment="xine-devel is &lt;1.1.1-24.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049650" version="1" comment="xine-extra is &lt;1.1.1-24.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049648" version="1" comment="xine-lib-32bit is &lt;1.1.1-24.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049651" version="1" comment="xine-lib-64bit is &lt;1.1.1-24.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049652" version="1" comment="xine-lib-x86 is &lt;1.1.1-24.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049649" version="1" comment="xine-lib is &lt;1.1.1-24.43" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049653" version="1" comment="xine-ui is &lt;0.99.4-32.39" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049662" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049663" version="1" comment="tomcat5-webapps is &lt;5.0.30-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049664" version="1" comment="tomcat5 is &lt;5.0.30-27.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036170"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049869" version="1" comment="bytefx-data-mysql is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049870" version="1" comment="ibm-data-db2 is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049871" version="1" comment="mono-basic is &lt;1.2.2-13.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049872" version="1" comment="mono-core-32bit is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049888" version="1" comment="mono-core-x86 is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049873" version="1" comment="mono-core is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049874" version="1" comment="mono-data-firebird is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049875" version="1" comment="mono-data-oracle is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049876" version="1" comment="mono-data-postgresql is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049877" version="1" comment="mono-data-sqlite is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049878" version="1" comment="mono-data-sybase is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049879" version="1" comment="mono-data is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049880" version="1" comment="mono-devel is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049881" version="1" comment="mono-extras is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049889" version="1" comment="mono-jscript is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049882" version="1" comment="mono-locale-extras is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049883" version="1" comment="mono-nunit is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049884" version="1" comment="mono-web is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049885" version="1" comment="mono-winforms is &lt;1.2.2-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053214" version="1" comment="ruby-devel is &lt;1.8.6.p369-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053215" version="1" comment="ruby-doc-html is &lt;1.8.6.p369-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053216" version="1" comment="ruby-doc-ri is &lt;1.8.6.p369-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053217" version="1" comment="ruby-examples is &lt;1.8.6.p369-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053218" version="1" comment="ruby-test-suite is &lt;1.8.6.p369-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053219" version="1" comment="ruby-tk is &lt;1.8.6.p369-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053213" version="1" comment="ruby is &lt;1.8.6.p369-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009049914" version="1" comment="jasper is &lt;1.701.0-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050003" version="1" comment="ipsec-tools is &lt;0.6.5-10.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050009" version="1" comment="novell-ipsec-tools-devel is &lt;0.6.3-26.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050008" version="1" comment="novell-ipsec-tools is &lt;0.6.3-26.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050010" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050011" version="1" comment="php5-bcmath is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050012" version="1" comment="php5-bz2 is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050013" version="1" comment="php5-calendar is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050014" version="1" comment="php5-ctype is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050015" version="1" comment="php5-curl is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050016" version="1" comment="php5-dba is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050017" version="1" comment="php5-dbase is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050018" version="1" comment="php5-devel is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050019" version="1" comment="php5-dom is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050020" version="1" comment="php5-exif is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050021" version="1" comment="php5-fastcgi is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050022" version="1" comment="php5-ftp is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050023" version="1" comment="php5-gd is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050024" version="1" comment="php5-gettext is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050025" version="1" comment="php5-gmp is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050026" version="1" comment="php5-iconv is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050027" version="1" comment="php5-imap is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050029" version="1" comment="php5-ldap is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050030" version="1" comment="php5-mbstring is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050031" version="1" comment="php5-mcrypt is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050032" version="1" comment="php5-mhash is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050033" version="1" comment="php5-mysql is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050034" version="1" comment="php5-ncurses is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050035" version="1" comment="php5-odbc is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050036" version="1" comment="php5-openssl is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050037" version="1" comment="php5-pcntl is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050038" version="1" comment="php5-pdo is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050039" version="1" comment="php5-pear is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050040" version="1" comment="php5-pgsql is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050041" version="1" comment="php5-posix is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050042" version="1" comment="php5-pspell is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050043" version="1" comment="php5-shmop is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050044" version="1" comment="php5-snmp is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050045" version="1" comment="php5-soap is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050046" version="1" comment="php5-sockets is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050047" version="1" comment="php5-sqlite is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050048" version="1" comment="php5-suhosin is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050049" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050050" version="1" comment="php5-sysvsem is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050051" version="1" comment="php5-sysvshm is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050058" version="1" comment="php5-tidy is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050052" version="1" comment="php5-tokenizer is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050053" version="1" comment="php5-wddx is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050054" version="1" comment="php5-xmlreader is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050055" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050056" version="1" comment="php5-xsl is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050057" version="1" comment="php5-zlib is &lt;5.2.5-9.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050278" version="1" comment="dbus-1-devel-doc is &lt;0.60-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050246" version="1" comment="dbus-1-devel is &lt;0.60-33.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050272" version="1" comment="dbus-1-java is &lt;0.60-33.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050256" version="1" comment="dbus-1-qt is &lt;4.3.4-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068047" version="1" comment="dbus-1-32bit is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068048" version="1" comment="dbus-1-64bit is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068049" version="1" comment="dbus-1-devel is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068050" version="1" comment="dbus-1-glib-32bit is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068051" version="1" comment="dbus-1-glib-64bit is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068052" version="1" comment="dbus-1-glib-x86 is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068053" version="1" comment="dbus-1-glib is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068054" version="1" comment="dbus-1-gtk is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068055" version="1" comment="dbus-1-java is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068056" version="1" comment="dbus-1-mono is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068057" version="1" comment="dbus-1-python is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068058" version="1" comment="dbus-1-qt3-32bit is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068059" version="1" comment="dbus-1-qt3-64bit is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068060" version="1" comment="dbus-1-qt3-devel is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068061" version="1" comment="dbus-1-qt3-x86 is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068062" version="1" comment="dbus-1-qt3 is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068063" version="1" comment="dbus-1-x11 is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068064" version="1" comment="dbus-1-x86 is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068065" version="1" comment="dbus-1 is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068066" version="1" comment="dbus-1-devel-doc is &lt;0.60-33.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065536" version="1" comment="ed is &lt;0.2-881.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050311" version="1" comment="ethereal-devel is &lt;0.10.14-16.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050335" version="1" comment="mysql-Max is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050338" version="1" comment="mysql-bench is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050326" version="1" comment="mysql-client is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050327" version="1" comment="mysql-devel is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050328" version="1" comment="mysql-shared-32bit is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050336" version="1" comment="mysql-shared-64bit is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050337" version="1" comment="mysql-shared-x86 is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050329" version="1" comment="mysql-shared is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050330" version="1" comment="mysql is &lt;5.0.26-12.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050368" version="1" comment="rubygem-activerecord-1_14 is &lt;1.14.4-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050369" version="1" comment="rubygem-activerecord-2_0 is &lt;2.0.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050370" version="1" comment="rubygem-activerecord is &lt;2.0.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050452" version="1" comment="net-snmp-devel-64bit is &lt;5.3.0.1-25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050445" version="1" comment="net-snmp-devel is &lt;5.3.0.1-25.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050492" version="1" comment="dbus-1-devel-doc is &lt;0.60-33.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050474" version="1" comment="dbus-1-devel is &lt;0.60-33.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050488" version="1" comment="dbus-1-java is &lt;0.60-33.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050734" version="1" comment="libmsrpc-devel is &lt;3.0.32-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050735" version="1" comment="libmsrpc is &lt;3.0.32-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050711" version="1" comment="libsmbclient-devel is &lt;3.0.32-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050745" version="1" comment="libsmbsharemodes-devel is &lt;3.0.32-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050746" version="1" comment="libsmbsharemodes is &lt;3.0.32-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050741" version="1" comment="samba-python is &lt;3.0.32-0.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050794" version="1" comment="ndiswrapper-kmp-bigsmp is &lt;1.34_2.6.16.60_0.33-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050795" version="1" comment="ndiswrapper-kmp-default is &lt;1.34_2.6.16.60_0.33-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050796" version="1" comment="ndiswrapper-kmp-smp is &lt;1.34_2.6.16.60_0.33-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050797" version="1" comment="ndiswrapper is &lt;1.34-1.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054355" version="1" comment="mysql-Max is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054358" version="1" comment="mysql-bench is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054350" version="1" comment="mysql-client is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054351" version="1" comment="mysql-devel is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054352" version="1" comment="mysql-shared-32bit is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054356" version="1" comment="mysql-shared-64bit is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054357" version="1" comment="mysql-shared-x86 is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054353" version="1" comment="mysql-shared is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054354" version="1" comment="mysql is &lt;5.0.26-12.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050816" version="1" comment="ib-bonding-kmp-rt is &lt;0.9.0_2.6.22.19_0.21-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050817" version="1" comment="ib-bonding-kmp-rt_bigsmp is &lt;0.9.0_2.6.22.19_0.21-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050818" version="1" comment="ib-bonding-kmp-rt_debug is &lt;0.9.0_2.6.22.19_0.21-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050819" version="1" comment="ib-bonding-kmp-rt_timing is &lt;0.9.0_2.6.22.19_0.21-1.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050820" version="1" comment="kernel-rt is &lt;2.6.22.19-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050821" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050822" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050823" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050824" version="1" comment="kernel-source is &lt;2.6.22.19-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050825" version="1" comment="kernel-syms is &lt;2.6.22.19-0.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050826" version="1" comment="ofed-cxgb3-NIC-kmp-rt is &lt;1.3_2.6.22.19_0.21-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050827" version="1" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.21-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050828" version="1" comment="ofed-cxgb3-NIC-kmp-rt_debug is &lt;1.3_2.6.22.19_0.21-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050829" version="1" comment="ofed-cxgb3-NIC-kmp-rt_timing is &lt;1.3_2.6.22.19_0.21-0.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050830" version="1" comment="ofed-doc is &lt;1.3-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050831" version="1" comment="ofed-kmp-rt is &lt;1.3_2.6.22.19_0.21-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050832" version="1" comment="ofed-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.21-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050833" version="1" comment="ofed-kmp-rt_debug is &lt;1.3_2.6.22.19_0.21-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050834" version="1" comment="ofed-kmp-rt_timing is &lt;1.3_2.6.22.19_0.21-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050835" version="1" comment="ofed is &lt;1.3-0.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050855" version="1" comment="graphviz-devel is &lt;2.6-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050856" version="1" comment="graphviz-tcl is &lt;2.6-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050854" version="1" comment="graphviz is &lt;2.6-22.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050859" version="1" comment="dapl-32bit is &lt;1.2.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050860" version="1" comment="dapl-devel-32bit is &lt;1.2.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050861" version="1" comment="dapl-devel is &lt;1.2.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050862" version="1" comment="dapl2-32bit is &lt;2.0.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050863" version="1" comment="dapl2-devel-32bit is &lt;2.0.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050864" version="1" comment="dapl2-devel is &lt;2.0.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050865" version="1" comment="dapl2 is &lt;2.0.9-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050866" version="1" comment="dapl is &lt;1.2.7-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050867" version="1" comment="ib-bonding-kmp-rt is &lt;0.9.0_2.6.22.19_0.19-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050868" version="1" comment="ib-bonding-kmp-rt_bigsmp is &lt;0.9.0_2.6.22.19_0.19-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050869" version="1" comment="ib-bonding-kmp-rt_debug is &lt;0.9.0_2.6.22.19_0.19-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050870" version="1" comment="ib-bonding-kmp-rt_timing is &lt;0.9.0_2.6.22.19_0.19-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050871" version="1" comment="ib-bonding is &lt;0.9.0-1.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050872" version="1" comment="ibutils-32bit is &lt;1.2-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050873" version="1" comment="ibutils is &lt;1.2-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050874" version="1" comment="ibvexdmtools is &lt;0.0.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033021"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050875" version="1" comment="infiniband-diags is &lt;1.3.6-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033022"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050876" version="1" comment="kernel-rt is &lt;2.6.22.19-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050877" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050878" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050879" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050880" version="1" comment="kernel-source is &lt;2.6.22.19-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050881" version="1" comment="kernel-syms is &lt;2.6.22.19-0.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050882" version="1" comment="libcxgb3-32bit is &lt;1.2.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050883" version="1" comment="libcxgb3-devel-32bit is &lt;1.2.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050884" version="1" comment="libcxgb3-devel is &lt;1.2.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050885" version="1" comment="libcxgb3 is &lt;1.2.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050886" version="1" comment="librdmacm-32bit is &lt;1.0.7-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050887" version="1" comment="librdmacm-devel-32bit is &lt;1.0.7-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050888" version="1" comment="librdmacm-devel is &lt;1.0.7-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050889" version="1" comment="librdmacm is &lt;1.0.7-31.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050890" version="1" comment="mpi-selector is &lt;1.0.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050891" version="1" comment="mpitests-mvapich2 is &lt;3.0-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050892" version="1" comment="mpitests-mvapich is &lt;3.0-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050893" version="1" comment="mpitests-openmpi is &lt;3.0-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050894" version="1" comment="mpitests is &lt;3.0-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050895" version="1" comment="mstflint is &lt;1.3-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050896" version="1" comment="mvapich-devel is &lt;1.0.1_2533-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050897" version="1" comment="mvapich2-32bit is &lt;1.0.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050898" version="1" comment="mvapich2-devel is &lt;1.0.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050899" version="1" comment="mvapich2 is &lt;1.0.3-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050900" version="1" comment="mvapich is &lt;1.0.1_2533-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050901" version="1" comment="ofed-cxgb3-NIC-kmp-rt is &lt;1.3_2.6.22.19_0.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050902" version="1" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050903" version="1" comment="ofed-cxgb3-NIC-kmp-rt_debug is &lt;1.3_2.6.22.19_0.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050904" version="1" comment="ofed-cxgb3-NIC-kmp-rt_timing is &lt;1.3_2.6.22.19_0.19-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050905" version="1" comment="ofed-doc is &lt;1.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050906" version="1" comment="ofed-kmp-rt is &lt;1.3_2.6.22.19_0.19-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050907" version="1" comment="ofed-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.19-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050908" version="1" comment="ofed-kmp-rt_debug is &lt;1.3_2.6.22.19_0.19-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050909" version="1" comment="ofed-kmp-rt_timing is &lt;1.3_2.6.22.19_0.19-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050910" version="1" comment="ofed is &lt;1.3-0.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050911" version="1" comment="openmpi-32bit is &lt;1.2.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050912" version="1" comment="openmpi-devel-32bit is &lt;1.2.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050913" version="1" comment="openmpi-devel is &lt;1.2.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050914" version="1" comment="openmpi is &lt;1.2.6-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050915" version="1" comment="opensm-32bit is &lt;3.1.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050916" version="1" comment="opensm-devel-32bit is &lt;3.1.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050917" version="1" comment="opensm-devel is &lt;3.1.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050918" version="1" comment="opensm is &lt;3.1.11-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050919" version="1" comment="perftest is &lt;1.2-1.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050920" version="1" comment="qlvnictools is &lt;0.0.1-1.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065304" version="1" comment="kdenetwork3-IRC is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065300" version="1" comment="kdenetwork3-InstantMessenger is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065305" version="1" comment="kdenetwork3-dialup is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065306" version="1" comment="kdenetwork3-lan is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032684"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065307" version="1" comment="kdenetwork3-lisa is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065301" version="1" comment="kdenetwork3-news is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065308" version="1" comment="kdenetwork3-query is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065302" version="1" comment="kdenetwork3-vnc is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065309" version="1" comment="kdenetwork3-wireless is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065303" version="1" comment="kdenetwork3 is &lt;3.5.1-32.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050947" version="1" comment="python-demo is &lt;2.4.2-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050941" version="1" comment="python-devel is &lt;2.4.2-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050948" version="1" comment="python-idle is &lt;2.4.2-18.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050950" version="1" comment="valgrind is &lt;3.3.0-15.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036363"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050961" version="1" comment="kernel-debug is &lt;2.6.16.60-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050962" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050959" version="1" comment="kernel-xen is &lt;2.6.16.60-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009050960" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036366"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009033880" version="1" comment="clamav is &lt;0.94.1-2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009031703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051026" version="1" comment="openssl-doc is &lt;0.9.8a-18.27" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069579" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-13.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069581" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-13.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069582" version="1" comment="compat-openssl097g-x86 is &lt;0.9.7g-13.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069580" version="1" comment="compat-openssl097g is &lt;0.9.7g-13.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051130" version="1" comment="avahi-devel is &lt;0.6.5-29.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051128" version="1" comment="avahi-glib is &lt;0.6.5-29.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051129" version="1" comment="avahi is &lt;0.6.5-29.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051133" version="1" comment="libvirt-devel is &lt;0.3.3-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051131" version="1" comment="libvirt-python is &lt;0.3.3-18.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051157" version="1" comment="imlib2-devel is &lt;1.2.1-17.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031740"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051158" version="1" comment="imlib2-loaders is &lt;1.2.1-17.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051159" version="1" comment="imlib2 is &lt;1.2.1-17.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051171" version="1" comment="rubygem-actionpack-1_12 is &lt;1.12.5-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051172" version="1" comment="rubygem-actionpack-2_0 is &lt;2.0.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051173" version="1" comment="rubygem-actionpack is &lt;2.0.2-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051200" version="1" comment="clamav is &lt;0.94.2-1.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055404" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055405" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055406" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055113" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055114" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055115" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055116" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051321" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051322" version="1" comment="php5-bcmath is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051323" version="1" comment="php5-bz2 is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051324" version="1" comment="php5-calendar is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051325" version="1" comment="php5-ctype is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051326" version="1" comment="php5-curl is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051327" version="1" comment="php5-dba is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051328" version="1" comment="php5-dbase is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051329" version="1" comment="php5-devel is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051330" version="1" comment="php5-dom is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051331" version="1" comment="php5-exif is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051332" version="1" comment="php5-fastcgi is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051333" version="1" comment="php5-ftp is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051334" version="1" comment="php5-gd is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051335" version="1" comment="php5-gettext is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051336" version="1" comment="php5-gmp is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051337" version="1" comment="php5-iconv is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051338" version="1" comment="php5-imap is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051340" version="1" comment="php5-ldap is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051341" version="1" comment="php5-mbstring is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051342" version="1" comment="php5-mcrypt is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051343" version="1" comment="php5-mhash is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051344" version="1" comment="php5-mysql is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051345" version="1" comment="php5-ncurses is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051346" version="1" comment="php5-odbc is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051347" version="1" comment="php5-openssl is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051348" version="1" comment="php5-pcntl is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051349" version="1" comment="php5-pdo is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051350" version="1" comment="php5-pear is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051351" version="1" comment="php5-pgsql is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051352" version="1" comment="php5-posix is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051353" version="1" comment="php5-pspell is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051354" version="1" comment="php5-shmop is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051355" version="1" comment="php5-snmp is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051356" version="1" comment="php5-soap is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051357" version="1" comment="php5-sockets is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051358" version="1" comment="php5-sqlite is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051359" version="1" comment="php5-suhosin is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051360" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051361" version="1" comment="php5-sysvsem is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051362" version="1" comment="php5-sysvshm is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051369" version="1" comment="php5-tidy is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051363" version="1" comment="php5-tokenizer is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051364" version="1" comment="php5-wddx is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051365" version="1" comment="php5-xmlreader is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051366" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051367" version="1" comment="php5-xsl is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051368" version="1" comment="php5-zlib is &lt;5.2.5-9.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051405" version="1" comment="epiphany is &lt;1.8.5-14.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051406" version="1" comment="gecko-sdk is &lt;1.8.0.14eol-0.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032810"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059325" version="1" comment="tomcat5-admin-webapps is &lt;5.5.27-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059326" version="1" comment="tomcat5-webapps is &lt;5.5.27-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059327" version="1" comment="tomcat5 is &lt;5.5.27-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053705" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053706" version="1" comment="tomcat5-webapps is &lt;5.0.30-27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053707" version="1" comment="tomcat5 is &lt;5.0.30-27.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059336" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059337" version="1" comment="tomcat5-webapps is &lt;5.0.30-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059338" version="1" comment="tomcat5 is &lt;5.0.30-27.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051497" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051498" version="1" comment="php5-bcmath is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051499" version="1" comment="php5-bz2 is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051500" version="1" comment="php5-calendar is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051501" version="1" comment="php5-ctype is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051502" version="1" comment="php5-curl is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051503" version="1" comment="php5-dba is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051504" version="1" comment="php5-dbase is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051505" version="1" comment="php5-devel is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051506" version="1" comment="php5-dom is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051507" version="1" comment="php5-exif is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051508" version="1" comment="php5-fastcgi is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051509" version="1" comment="php5-ftp is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051510" version="1" comment="php5-gd is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051511" version="1" comment="php5-gettext is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051512" version="1" comment="php5-gmp is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051513" version="1" comment="php5-iconv is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051514" version="1" comment="php5-imap is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051516" version="1" comment="php5-ldap is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051517" version="1" comment="php5-mbstring is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051518" version="1" comment="php5-mcrypt is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051519" version="1" comment="php5-mhash is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051520" version="1" comment="php5-mysql is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051521" version="1" comment="php5-ncurses is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051522" version="1" comment="php5-odbc is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051523" version="1" comment="php5-openssl is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051524" version="1" comment="php5-pcntl is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051525" version="1" comment="php5-pdo is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051526" version="1" comment="php5-pear is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051527" version="1" comment="php5-pgsql is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051528" version="1" comment="php5-posix is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051529" version="1" comment="php5-pspell is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051530" version="1" comment="php5-shmop is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051531" version="1" comment="php5-snmp is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051532" version="1" comment="php5-soap is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051533" version="1" comment="php5-sockets is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051534" version="1" comment="php5-sqlite is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051535" version="1" comment="php5-suhosin is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051536" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051537" version="1" comment="php5-sysvsem is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051538" version="1" comment="php5-sysvshm is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051545" version="1" comment="php5-tidy is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051539" version="1" comment="php5-tokenizer is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051540" version="1" comment="php5-wddx is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051541" version="1" comment="php5-xmlreader is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051542" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051543" version="1" comment="php5-xsl is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051544" version="1" comment="php5-zlib is &lt;5.2.5-9.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058237" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058238" version="1" comment="php5-bcmath is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058239" version="1" comment="php5-bz2 is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058240" version="1" comment="php5-calendar is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058241" version="1" comment="php5-ctype is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058242" version="1" comment="php5-curl is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058243" version="1" comment="php5-dba is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058244" version="1" comment="php5-dbase is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058245" version="1" comment="php5-devel is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058246" version="1" comment="php5-dom is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058247" version="1" comment="php5-exif is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058248" version="1" comment="php5-fastcgi is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058249" version="1" comment="php5-ftp is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058250" version="1" comment="php5-gd is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058251" version="1" comment="php5-gettext is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058252" version="1" comment="php5-gmp is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058253" version="1" comment="php5-iconv is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058254" version="1" comment="php5-imap is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058255" version="1" comment="php5-json is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058256" version="1" comment="php5-ldap is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058257" version="1" comment="php5-mbstring is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058258" version="1" comment="php5-mcrypt is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058259" version="1" comment="php5-mhash is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058260" version="1" comment="php5-mysql is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058261" version="1" comment="php5-ncurses is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058262" version="1" comment="php5-odbc is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058263" version="1" comment="php5-openssl is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058264" version="1" comment="php5-pcntl is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058265" version="1" comment="php5-pdo is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058266" version="1" comment="php5-pear is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058267" version="1" comment="php5-pgsql is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058268" version="1" comment="php5-posix is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058269" version="1" comment="php5-pspell is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058270" version="1" comment="php5-shmop is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058271" version="1" comment="php5-snmp is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058272" version="1" comment="php5-soap is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058273" version="1" comment="php5-sockets is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058274" version="1" comment="php5-sqlite is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058275" version="1" comment="php5-suhosin is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058276" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058277" version="1" comment="php5-sysvsem is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058278" version="1" comment="php5-sysvshm is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058279" version="1" comment="php5-tokenizer is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058280" version="1" comment="php5-wddx is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058281" version="1" comment="php5-xmlreader is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058282" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058283" version="1" comment="php5-xsl is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058284" version="1" comment="php5-zlib is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058285" version="1" comment="php5-tidy is &lt;5.2.5-9.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058294" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058295" version="1" comment="php5-bcmath is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058296" version="1" comment="php5-bz2 is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058297" version="1" comment="php5-calendar is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058298" version="1" comment="php5-ctype is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058299" version="1" comment="php5-curl is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058300" version="1" comment="php5-dba is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058301" version="1" comment="php5-dbase is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058302" version="1" comment="php5-devel is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058303" version="1" comment="php5-dom is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058304" version="1" comment="php5-exif is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058305" version="1" comment="php5-fastcgi is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058306" version="1" comment="php5-ftp is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058307" version="1" comment="php5-gd is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058308" version="1" comment="php5-gettext is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058309" version="1" comment="php5-gmp is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058310" version="1" comment="php5-iconv is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058311" version="1" comment="php5-imap is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058312" version="1" comment="php5-json is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058313" version="1" comment="php5-ldap is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058314" version="1" comment="php5-mbstring is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058315" version="1" comment="php5-mcrypt is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058316" version="1" comment="php5-mhash is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058317" version="1" comment="php5-mysql is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058318" version="1" comment="php5-ncurses is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058319" version="1" comment="php5-odbc is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058320" version="1" comment="php5-openssl is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058321" version="1" comment="php5-pcntl is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058322" version="1" comment="php5-pdo is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058323" version="1" comment="php5-pear is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058324" version="1" comment="php5-pgsql is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058325" version="1" comment="php5-posix is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058326" version="1" comment="php5-pspell is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058327" version="1" comment="php5-shmop is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058328" version="1" comment="php5-snmp is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058329" version="1" comment="php5-soap is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058330" version="1" comment="php5-sockets is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058331" version="1" comment="php5-sqlite is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058332" version="1" comment="php5-suhosin is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058333" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058334" version="1" comment="php5-sysvsem is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058335" version="1" comment="php5-sysvshm is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058336" version="1" comment="php5-tokenizer is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058337" version="1" comment="php5-wddx is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058338" version="1" comment="php5-xmlreader is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058339" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058340" version="1" comment="php5-xsl is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058341" version="1" comment="php5-zlib is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058342" version="1" comment="php5-tidy is &lt;5.2.5-9.23.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051558" version="1" comment="netatalk-devel is &lt;2.0.3-21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067079" version="1" comment="audiofile-32bit is &lt;0.2.6-17.10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067082" version="1" comment="audiofile-64bit is &lt;0.2.6-17.10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067080" version="1" comment="audiofile-devel is &lt;0.2.6-17.10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067083" version="1" comment="audiofile-x86 is &lt;0.2.6-17.10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067081" version="1" comment="audiofile is &lt;0.2.6-17.10.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066633" version="1" comment="audiofile-32bit is &lt;0.2.6-17.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066628" version="1" comment="audiofile-32bit is &lt;0.2.6-17.10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066634" version="1" comment="audiofile-64bit is &lt;0.2.6-17.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031244"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066629" version="1" comment="audiofile-devel is &lt;0.2.6-17.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066630" version="1" comment="audiofile-devel is &lt;0.2.6-17.10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066635" version="1" comment="audiofile-x86 is &lt;0.2.6-17.10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066631" version="1" comment="audiofile is &lt;0.2.6-17.10.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066632" version="1" comment="audiofile is &lt;0.2.6-17.10.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061260" version="1" comment="MozillaFirefox-translations is &lt;3.5.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061261" version="1" comment="MozillaFirefox is &lt;3.5.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061262" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061263" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061264" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061265" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061266" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061267" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061268" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.10-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061269" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061270" version="1" comment="python-xpcom191 is &lt;1.9.1.10-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051615" version="1" comment="net-snmp-devel-64bit is &lt;5.3.0.1-25.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051611" version="1" comment="net-snmp-devel is &lt;5.3.0.1-25.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069827" version="1" comment="libpng-32bit is &lt;1.2.8-19.31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069828" version="1" comment="libpng-64bit is &lt;1.2.8-19.31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069829" version="1" comment="libpng-devel-32bit is &lt;1.2.8-19.31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069830" version="1" comment="libpng-devel-64bit is &lt;1.2.8-19.31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069831" version="1" comment="libpng-devel is &lt;1.2.8-19.31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069832" version="1" comment="libpng-x86 is &lt;1.2.8-19.31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069833" version="1" comment="libpng is &lt;1.2.8-19.31.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051619" version="1" comment="clamav is &lt;0.95-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058924" version="1" comment="mysql-Max is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058919" version="1" comment="mysql-client is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058920" version="1" comment="mysql-devel is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058921" version="1" comment="mysql-shared-32bit is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058925" version="1" comment="mysql-shared-64bit is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058926" version="1" comment="mysql-shared-x86 is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058922" version="1" comment="mysql-shared is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058923" version="1" comment="mysql is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058927" version="1" comment="mysql-bench is &lt;5.0.26-12.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058933" version="1" comment="mysql-Max is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058928" version="1" comment="mysql-client is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058929" version="1" comment="mysql-devel is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058930" version="1" comment="mysql-shared-32bit is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058931" version="1" comment="mysql-shared is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058932" version="1" comment="mysql is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058936" version="1" comment="mysql-bench is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058934" version="1" comment="mysql-shared-64bit is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058935" version="1" comment="mysql-shared-x86 is &lt;5.0.26-12.24.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058392" version="1" comment="rubygem-actionpack-2_0 is &lt;2.0.2-0.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058393" version="1" comment="rubygem-actionpack-2_0 is &lt;2.0.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064327" version="1" comment="openssl-32bit is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064331" version="1" comment="openssl-64bit is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064328" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064332" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064329" version="1" comment="openssl-devel is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064333" version="1" comment="openssl-doc is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064334" version="1" comment="openssl-x86 is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064330" version="1" comment="openssl is &lt;0.9.8a-18.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051622" version="1" comment="xntp-doc is &lt;4.2.4p3-48.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053413" version="1" comment="libapr-util1-devel-64bit is &lt;1.2.2-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053410" version="1" comment="libapr-util1-devel is &lt;1.2.2-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053683" version="1" comment="bind-chrootenv is &lt;9.3.4-1.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053684" version="1" comment="bind-devel is &lt;9.3.4-1.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053685" version="1" comment="bind-doc is &lt;9.3.4-1.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053686" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053687" version="1" comment="bind-libs is &lt;9.3.4-1.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053688" version="1" comment="bind-utils is &lt;9.3.4-1.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053689" version="1" comment="bind is &lt;9.3.4-1.20.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051647" version="1" comment="bind-chrootenv is &lt;9.3.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051648" version="1" comment="bind-devel-64bit is &lt;9.3.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051649" version="1" comment="bind-devel is &lt;9.3.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051650" version="1" comment="bind-doc is &lt;9.3.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051653" version="1" comment="bind is &lt;9.3.4-1.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036469"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051699" version="1" comment="curl-devel is &lt;7.15.1-19.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051788" version="1" comment="eID-belgium is &lt;2.5.9-26.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051813" version="1" comment="amarok-libvisual is &lt;1.4.8-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051814" version="1" comment="amarok-xine is &lt;1.4.8-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051816" version="1" comment="amarok is &lt;1.4.8-13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051851" version="1" comment="xpdf is &lt;3.01-21.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051856" version="1" comment="poppler-devel is &lt;0.4.4-19.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051860" version="1" comment="kdegraphics3-devel is &lt;3.5.1-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051867" version="1" comment="kdegraphics3-extra is &lt;3.5.1-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051862" version="1" comment="kdegraphics3-kamera is &lt;3.5.1-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051865" version="1" comment="kdegraphics3-scan is &lt;3.5.1-23.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053892" version="1" comment="icu-data is &lt;3.4-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053883" version="1" comment="icu is &lt;3.4-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053887" version="1" comment="libicu-devel-32bit is &lt;3.4-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053888" version="1" comment="libicu-devel-64bit is &lt;3.4-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053889" version="1" comment="libicu-devel is &lt;3.4-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053890" version="1" comment="libicu-doc is &lt;3.4-16.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051869" version="1" comment="xntp-doc is &lt;4.2.4p3-48.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051900" version="1" comment="libsndfile-devel is &lt;1.0.12-13.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054600" version="1" comment="OpenOffice_org-cs is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054602" version="1" comment="OpenOffice_org-de is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054605" version="1" comment="OpenOffice_org-es is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054607" version="1" comment="OpenOffice_org-fr is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054608" version="1" comment="OpenOffice_org-galleries is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054609" version="1" comment="OpenOffice_org-gnome is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054612" version="1" comment="OpenOffice_org-hu is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054613" version="1" comment="OpenOffice_org-it is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054614" version="1" comment="OpenOffice_org-ja is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054615" version="1" comment="OpenOffice_org-kde is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054617" version="1" comment="OpenOffice_org-mono is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054622" version="1" comment="OpenOffice_org-pl is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054623" version="1" comment="OpenOffice_org-pt-BR is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054625" version="1" comment="OpenOffice_org-sk is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054628" version="1" comment="OpenOffice_org-zh-CN is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054629" version="1" comment="OpenOffice_org-zh-TW is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054631" version="1" comment="OpenOffice_org is &lt;3.1.1-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058675" version="1" comment="OpenOffice_org-cs is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058677" version="1" comment="OpenOffice_org-de is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058678" version="1" comment="OpenOffice_org-es is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058680" version="1" comment="OpenOffice_org-fr is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058681" version="1" comment="OpenOffice_org-galleries is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058682" version="1" comment="OpenOffice_org-gnome is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058685" version="1" comment="OpenOffice_org-hu is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058686" version="1" comment="OpenOffice_org-it is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058687" version="1" comment="OpenOffice_org-ja is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058688" version="1" comment="OpenOffice_org-kde is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058689" version="1" comment="OpenOffice_org-mono is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058694" version="1" comment="OpenOffice_org-pl is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058695" version="1" comment="OpenOffice_org-pt-BR is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058697" version="1" comment="OpenOffice_org-sk is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058700" version="1" comment="OpenOffice_org-zh-CN is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058701" version="1" comment="OpenOffice_org-zh-TW is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058703" version="1" comment="OpenOffice_org is &lt;3.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058707" version="1" comment="OpenOffice_org-cs is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058709" version="1" comment="OpenOffice_org-de is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058712" version="1" comment="OpenOffice_org-es is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058714" version="1" comment="OpenOffice_org-fr is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058715" version="1" comment="OpenOffice_org-galleries is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058716" version="1" comment="OpenOffice_org-gnome is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058719" version="1" comment="OpenOffice_org-hu is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058720" version="1" comment="OpenOffice_org-it is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058721" version="1" comment="OpenOffice_org-ja is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058722" version="1" comment="OpenOffice_org-kde is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058724" version="1" comment="OpenOffice_org-mono is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058729" version="1" comment="OpenOffice_org-pl is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058730" version="1" comment="OpenOffice_org-pt-BR is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058732" version="1" comment="OpenOffice_org-sk is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058735" version="1" comment="OpenOffice_org-zh-CN is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058736" version="1" comment="OpenOffice_org-zh-TW is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058738" version="1" comment="OpenOffice_org is &lt;3.2-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009051999" version="1" comment="opensc-32bit is &lt;0.9.6-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052002" version="1" comment="opensc-devel is &lt;0.9.6-17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060320" version="1" comment="evolution-data-server-32bit is &lt;1.6.0-43.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060323" version="1" comment="evolution-data-server-64bit is &lt;1.6.0-43.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060321" version="1" comment="evolution-data-server-devel is &lt;1.6.0-43.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060324" version="1" comment="evolution-data-server-x86 is &lt;1.6.0-43.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060322" version="1" comment="evolution-data-server is &lt;1.6.0-43.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052231" version="1" comment="ghostscript-fonts-rus is &lt;8.15.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052232" version="1" comment="ghostscript-omni is &lt;8.15.4-16.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052233" version="1" comment="libgimpprint-devel is &lt;4.2.7-62.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052269" version="1" comment="openssl-doc is &lt;0.9.8a-18.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052306" version="1" comment="perl-DBD-Pg is &lt;1.43-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056500" version="1" comment="zope is &lt;2.7.8-15.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037409"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056501" version="1" comment="zope3 is &lt;3.1.0-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056502" version="1" comment="zope is &lt;2.7.8-15.15.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056504" version="1" comment="zope3 is &lt;3.1.0-18.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053172" version="1" comment="ib-bonding-kmp-rt is &lt;0.9.0_2.6.22.19_0.22-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053173" version="1" comment="ib-bonding-kmp-rt_bigsmp is &lt;0.9.0_2.6.22.19_0.22-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053174" version="1" comment="ib-bonding-kmp-rt_debug is &lt;0.9.0_2.6.22.19_0.22-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053175" version="1" comment="ib-bonding-kmp-rt_timing is &lt;0.9.0_2.6.22.19_0.22-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053176" version="1" comment="kernel-rt is &lt;2.6.22.19-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053177" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053178" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053179" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053180" version="1" comment="kernel-source is &lt;2.6.22.19-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053181" version="1" comment="kernel-syms is &lt;2.6.22.19-0.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053182" version="1" comment="ofed-cxgb3-NIC-kmp-rt is &lt;1.3_2.6.22.19_0.22-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053183" version="1" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.22-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053184" version="1" comment="ofed-cxgb3-NIC-kmp-rt_debug is &lt;1.3_2.6.22.19_0.22-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053185" version="1" comment="ofed-cxgb3-NIC-kmp-rt_timing is &lt;1.3_2.6.22.19_0.22-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053186" version="1" comment="ofed-doc is &lt;1.3-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053187" version="1" comment="ofed-kmp-rt is &lt;1.3_2.6.22.19_0.22-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053188" version="1" comment="ofed-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.22-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053189" version="1" comment="ofed-kmp-rt_debug is &lt;1.3_2.6.22.19_0.22-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053190" version="1" comment="ofed-kmp-rt_timing is &lt;1.3_2.6.22.19_0.22-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053191" version="1" comment="ofed is &lt;1.3-0.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052387" version="1" comment="cyrus-sasl-otp is &lt;2.1.21-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052388" version="1" comment="cyrus-sasl-sqlauxprop is &lt;2.1.21-18.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056794" version="1" comment="kdelibs3-32bit is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056800" version="1" comment="kdelibs3-64bit is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056795" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056801" version="1" comment="kdelibs3-arts-64bit is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056802" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056796" version="1" comment="kdelibs3-arts is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056797" version="1" comment="kdelibs3-devel is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056798" version="1" comment="kdelibs3-doc is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056803" version="1" comment="kdelibs3-x86 is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056799" version="1" comment="kdelibs3 is &lt;3.5.1-49.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055963" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.15-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055964" version="1" comment="python-xpcom190 is &lt;1.9.0.15-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055916" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.4-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055917" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055918" version="1" comment="python-xpcom191 is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055908" version="1" comment="MozillaFirefox-translations is &lt;3.5.4-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055909" version="1" comment="MozillaFirefox is &lt;3.5.4-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055910" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055911" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055912" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055913" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055914" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055915" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.4-2.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055919" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055920" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055921" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055922" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055923" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055924" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055925" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055926" version="1" comment="python-xpcom190 is &lt;1.9.0.15-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056676" version="1" comment="kdelibs3-devel is &lt;3.5.1-49.52.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056070" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056073" version="1" comment="mozilla-nspr-64bit is &lt;4.8.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056071" version="1" comment="mozilla-nspr-devel is &lt;4.8.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056074" version="1" comment="mozilla-nspr-x86 is &lt;4.8.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056072" version="1" comment="mozilla-nspr is &lt;4.8.2-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053438" version="1" comment="dhcp-devel is &lt;3.0.3-23.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053439" version="1" comment="dhcp-relay is &lt;3.0.3-23.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053440" version="1" comment="dhcp-server is &lt;3.0.3-23.55" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053667" version="1" comment="bind-chrootenv is &lt;9.3.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053668" version="1" comment="bind-devel-64bit is &lt;9.3.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053669" version="1" comment="bind-devel is &lt;9.3.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053670" version="1" comment="bind-doc is &lt;9.3.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053673" version="1" comment="bind is &lt;9.3.4-1.29" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052390" version="1" comment="xine-devel is &lt;1.1.1-24.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052393" version="1" comment="xine-extra is &lt;1.1.1-24.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052391" version="1" comment="xine-lib-32bit is &lt;1.1.1-24.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052394" version="1" comment="xine-lib-64bit is &lt;1.1.1-24.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052395" version="1" comment="xine-lib-x86 is &lt;1.1.1-24.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052392" version="1" comment="xine-lib is &lt;1.1.1-24.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052396" version="1" comment="xine-ui is &lt;0.99.4-32.42" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057562" version="1" comment="avahi-devel is &lt;0.6.5-29.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057560" version="1" comment="avahi-glib is &lt;0.6.5-29.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057561" version="1" comment="avahi is &lt;0.6.5-29.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057615" version="1" comment="avahi is &lt;0.6.5-29.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057616" version="1" comment="avahi-devel is &lt;0.6.5-29.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057614" version="1" comment="avahi-glib is &lt;0.6.5-29.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054167" version="1" comment="xpdf is &lt;3.01-21.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052440" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052444" version="1" comment="kernel-debug is &lt;2.6.16.60-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052446" version="1" comment="kernel-xen is &lt;2.6.16.60-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052448" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052479" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052480" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052482" version="1" comment="krb5-server is &lt;1.4.3-19.41" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052503" version="1" comment="postgresql-contrib is &lt;8.1.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052500" version="1" comment="postgresql-devel is &lt;8.1.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052504" version="1" comment="postgresql-docs is &lt;8.1.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052507" version="1" comment="postgresql-server is &lt;8.1.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052508" version="1" comment="postgresql is &lt;8.1.17-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056192" version="1" comment="dbus-1-qt-32bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056200" version="1" comment="dbus-1-qt-64bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056201" version="1" comment="dbus-1-qt-x86 is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056193" version="1" comment="dbus-1-qt is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056194" version="1" comment="qt-qt3support-32bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056202" version="1" comment="qt-qt3support-64bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056203" version="1" comment="qt-qt3support-x86 is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056195" version="1" comment="qt-qt3support is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056196" version="1" comment="qt-sql-32bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056204" version="1" comment="qt-sql-64bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056205" version="1" comment="qt-sql-x86 is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056197" version="1" comment="qt-sql is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056198" version="1" comment="qt-x11-32bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056206" version="1" comment="qt-x11-64bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056207" version="1" comment="qt-x11-x86 is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033489"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056199" version="1" comment="qt-x11 is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056208" version="1" comment="dbus-1-qt-devel is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056209" version="1" comment="qt-32bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056210" version="1" comment="qt-64bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056211" version="1" comment="qt-devel-64bit is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056212" version="1" comment="qt-devel-doc is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056213" version="1" comment="qt-x86 is &lt;4.3.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064972" version="1" comment="kdegraphics3-devel is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064979" version="1" comment="kdegraphics3-extra is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064973" version="1" comment="kdegraphics3-fax is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064975" version="1" comment="kdegraphics3-pdf is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064976" version="1" comment="kdegraphics3-postscript is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064978" version="1" comment="kdegraphics3 is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064974" version="1" comment="kdegraphics3-kamera is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064977" version="1" comment="kdegraphics3-scan is &lt;3.5.1-23.30.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052573" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052574" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052575" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052576" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052577" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052578" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052579" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052580" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052581" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr9-2.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056377" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056378" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056379" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056380" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056150" version="1" comment="kernel-default is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056151" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056152" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056153" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056154" version="1" comment="kernel-source is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056155" version="1" comment="kernel-syms is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056092" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056156" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056160" version="1" comment="kernel-debug is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056161" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056157" version="1" comment="kernel-smp is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056162" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056163" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056158" version="1" comment="kernel-xen is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056159" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056097" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056101" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056102" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063814" version="1" comment="firefox3-pango-32bit is &lt;1.14.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063815" version="1" comment="firefox3-pango is &lt;1.14.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063816" version="1" comment="firefox3-pango-devel is &lt;1.14.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063817" version="1" comment="firefox3-pango-doc is &lt;1.14.5-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057924" version="1" comment="pango-32bit is &lt;1.10.2-23.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057925" version="1" comment="pango-devel is &lt;1.10.2-23.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057926" version="1" comment="pango-doc is &lt;1.10.2-23.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057927" version="1" comment="pango is &lt;1.10.2-23.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057929" version="1" comment="pango-devel-64bit is &lt;1.10.2-23.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057928" version="1" comment="pango-64bit is &lt;1.10.2-23.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057930" version="1" comment="pango-x86 is &lt;1.10.2-23.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055745" version="1" comment="apache2-devel is &lt;2.2.3-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055746" version="1" comment="apache2-doc is &lt;2.2.3-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055747" version="1" comment="apache2-example-pages is &lt;2.2.3-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055748" version="1" comment="apache2-prefork is &lt;2.2.3-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055749" version="1" comment="apache2-worker is &lt;2.2.3-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055750" version="1" comment="apache2 is &lt;2.2.3-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055752" version="1" comment="apache2-devel is &lt;2.2.3-16.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055753" version="1" comment="apache2-doc is &lt;2.2.3-16.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055754" version="1" comment="apache2-example-pages is &lt;2.2.3-16.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055755" version="1" comment="apache2-prefork is &lt;2.2.3-16.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055756" version="1" comment="apache2-worker is &lt;2.2.3-16.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055757" version="1" comment="apache2 is &lt;2.2.3-16.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052781" version="1" comment="ethereal-devel is &lt;0.10.14-16.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053095" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053096" version="1" comment="php5-bcmath is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053097" version="1" comment="php5-bz2 is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053098" version="1" comment="php5-calendar is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053099" version="1" comment="php5-ctype is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053100" version="1" comment="php5-curl is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053101" version="1" comment="php5-dba is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053102" version="1" comment="php5-dbase is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053103" version="1" comment="php5-devel is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053104" version="1" comment="php5-dom is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053105" version="1" comment="php5-exif is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053106" version="1" comment="php5-fastcgi is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053107" version="1" comment="php5-ftp is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053108" version="1" comment="php5-gd is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053109" version="1" comment="php5-gettext is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053110" version="1" comment="php5-gmp is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053111" version="1" comment="php5-iconv is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053112" version="1" comment="php5-imap is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053114" version="1" comment="php5-ldap is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053115" version="1" comment="php5-mbstring is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053116" version="1" comment="php5-mcrypt is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053117" version="1" comment="php5-mhash is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053118" version="1" comment="php5-mysql is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053119" version="1" comment="php5-ncurses is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053120" version="1" comment="php5-odbc is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053121" version="1" comment="php5-openssl is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053122" version="1" comment="php5-pcntl is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053123" version="1" comment="php5-pdo is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053124" version="1" comment="php5-pear is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053125" version="1" comment="php5-pgsql is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053126" version="1" comment="php5-posix is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053127" version="1" comment="php5-pspell is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053128" version="1" comment="php5-shmop is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053129" version="1" comment="php5-snmp is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053130" version="1" comment="php5-soap is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053131" version="1" comment="php5-sockets is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053132" version="1" comment="php5-sqlite is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053133" version="1" comment="php5-suhosin is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053134" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053135" version="1" comment="php5-sysvsem is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053136" version="1" comment="php5-sysvshm is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053143" version="1" comment="php5-tidy is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053137" version="1" comment="php5-tokenizer is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053138" version="1" comment="php5-wddx is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053139" version="1" comment="php5-xmlreader is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053140" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053141" version="1" comment="php5-xsl is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053142" version="1" comment="php5-zlib is &lt;5.2.5-9.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052802" version="1" comment="xine-devel is &lt;1.1.1-24.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052805" version="1" comment="xine-extra is &lt;1.1.1-24.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052803" version="1" comment="xine-lib-32bit is &lt;1.1.1-24.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052806" version="1" comment="xine-lib-64bit is &lt;1.1.1-24.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052807" version="1" comment="xine-lib-x86 is &lt;1.1.1-24.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052804" version="1" comment="xine-lib is &lt;1.1.1-24.48" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052808" version="1" comment="xine-ui is &lt;0.99.4-32.44" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054851" version="1" comment="open-iscsi is &lt;2.0.707-0.47" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052854" version="1" comment="libwmf-devel is &lt;0.2.8.2-110.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052855" version="1" comment="libwmf is &lt;0.2.8.2-110.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053503" version="1" comment="finch-devel is &lt;2.3.1-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053500" version="1" comment="finch is &lt;2.3.1-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053504" version="1" comment="libpurple-devel is &lt;2.3.1-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053501" version="1" comment="libpurple is &lt;2.3.1-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053505" version="1" comment="pidgin-devel is &lt;2.3.1-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053502" version="1" comment="pidgin is &lt;2.3.1-10.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053506" version="1" comment="gaim-devel is &lt;1.5.0-50.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053507" version="1" comment="gaim is &lt;1.5.0-50.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052864" version="1" comment="openssl-doc is &lt;0.9.8a-18.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052888" version="1" comment="openssl-doc is &lt;0.9.8a-18.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054192" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054193" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054190" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054191" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059677" version="1" comment="gimp is &lt;2.2.10-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059678" version="1" comment="gimp-devel is &lt;2.2.10-22.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059679" version="1" comment="gimp-devel is &lt;2.2.10-22.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059680" version="1" comment="gimp is &lt;2.2.10-22.32" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058405" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058406" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058407" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058408" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058409" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058410" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058411" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058412" version="1" comment="python-xpcom190 is &lt;1.9.0.18-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058440" version="1" comment="MozillaFirefox-translations is &lt;3.5.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058441" version="1" comment="MozillaFirefox is &lt;3.5.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058442" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058443" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058444" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058445" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058446" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058447" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058448" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.8-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058449" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058450" version="1" comment="python-xpcom191 is &lt;1.9.1.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058451" version="1" comment="MozillaFirefox-translations is &lt;3.5.8-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058452" version="1" comment="MozillaFirefox is &lt;3.5.8-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058453" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.8-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052942" version="1" comment="quagga-devel is &lt;0.99.9-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052943" version="1" comment="quagga is &lt;0.99.9-14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052953" version="1" comment="novell-ipsec-tools-devel is &lt;0.6.3-26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052952" version="1" comment="novell-ipsec-tools is &lt;0.6.3-26.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052956" version="1" comment="ipsec-tools is &lt;0.6.5-10.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055821" version="1" comment="ib-bonding-kmp-rt is &lt;0.9.0_2.6.22.19_0.26-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055822" version="1" comment="ib-bonding-kmp-rt_bigsmp is &lt;0.9.0_2.6.22.19_0.26-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055823" version="1" comment="ib-bonding-kmp-rt_debug is &lt;0.9.0_2.6.22.19_0.26-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055824" version="1" comment="ib-bonding-kmp-rt_timing is &lt;0.9.0_2.6.22.19_0.26-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055825" version="1" comment="kernel-rt is &lt;2.6.22.19-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055826" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055827" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055828" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055829" version="1" comment="kernel-source is &lt;2.6.22.19-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055830" version="1" comment="kernel-syms is &lt;2.6.22.19-0.26" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055831" version="1" comment="ofed-cxgb3-NIC-kmp-rt is &lt;1.3_2.6.22.19_0.26-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055832" version="1" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.26-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055833" version="1" comment="ofed-cxgb3-NIC-kmp-rt_debug is &lt;1.3_2.6.22.19_0.26-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055834" version="1" comment="ofed-cxgb3-NIC-kmp-rt_timing is &lt;1.3_2.6.22.19_0.26-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055835" version="1" comment="ofed-doc is &lt;1.3-0.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055836" version="1" comment="ofed-kmp-rt is &lt;1.3_2.6.22.19_0.26-0.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055837" version="1" comment="ofed-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.26-0.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055838" version="1" comment="ofed-kmp-rt_debug is &lt;1.3_2.6.22.19_0.26-0.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055839" version="1" comment="ofed-kmp-rt_timing is &lt;1.3_2.6.22.19_0.26-0.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055840" version="1" comment="ofed is &lt;1.3-0.33.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054518" version="1" comment="OpenEXR-devel is &lt;1.2.2-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064930" version="1" comment="kdelibs3-32bit is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064936" version="1" comment="kdelibs3-64bit is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064931" version="1" comment="kdelibs3-arts-32bit is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064937" version="1" comment="kdelibs3-arts-64bit is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064938" version="1" comment="kdelibs3-arts-x86 is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064932" version="1" comment="kdelibs3-arts is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064933" version="1" comment="kdelibs3-devel is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064934" version="1" comment="kdelibs3-doc is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064939" version="1" comment="kdelibs3-x86 is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064935" version="1" comment="kdelibs3 is &lt;3.5.1-49.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052999" version="1" comment="ImageMagick-Magick++-devel is &lt;6.2.5-16.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052995" version="1" comment="ImageMagick-Magick++ is &lt;6.2.5-16.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052996" version="1" comment="ImageMagick-devel is &lt;6.2.5-16.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052997" version="1" comment="ImageMagick is &lt;6.2.5-16.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009052998" version="1" comment="perl-PerlMagick is &lt;6.2.5-16.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054078" version="1" comment="Xerces-c-devel is &lt;2.7.0-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054079" version="1" comment="Xerces-c is &lt;2.7.0-13.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053339" version="1" comment="libmsrpc-devel is &lt;3.0.32-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053340" version="1" comment="libmsrpc is &lt;3.0.32-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053329" version="1" comment="libsmbclient-devel is &lt;3.0.32-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053350" version="1" comment="libsmbsharemodes-devel is &lt;3.0.32-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053351" version="1" comment="libsmbsharemodes is &lt;3.0.32-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053346" version="1" comment="samba-python is &lt;3.0.32-0.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053154" version="1" comment="gstreamer010-plugins-good-doc is &lt;0.10.2-16.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053155" version="1" comment="gstreamer010-plugins-good-extra is &lt;0.10.2-16.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053674" version="1" comment="nagios-www is &lt;2.6-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053675" version="1" comment="nagios is &lt;2.6-13.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054100" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054101" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054097" version="1" comment="libtiff-devel is &lt;3.8.2-5.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055356" version="1" comment="mozilla-nss-tools is &lt;3.12.3.1-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054756" version="1" comment="ib-bonding-kmp-rt is &lt;0.9.0_2.6.22.19_0.23-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054757" version="1" comment="ib-bonding-kmp-rt_bigsmp is &lt;0.9.0_2.6.22.19_0.23-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054758" version="1" comment="ib-bonding-kmp-rt_debug is &lt;0.9.0_2.6.22.19_0.23-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054759" version="1" comment="ib-bonding-kmp-rt_timing is &lt;0.9.0_2.6.22.19_0.23-1.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054760" version="1" comment="kernel-rt is &lt;2.6.22.19-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054761" version="1" comment="kernel-rt_bigsmp is &lt;2.6.22.19-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054762" version="1" comment="kernel-rt_debug is &lt;2.6.22.19-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054763" version="1" comment="kernel-rt_timing is &lt;2.6.22.19-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054764" version="1" comment="kernel-source is &lt;2.6.22.19-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054765" version="1" comment="kernel-syms is &lt;2.6.22.19-0.23" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054766" version="1" comment="ofed-cxgb3-NIC-kmp-rt is &lt;1.3_2.6.22.19_0.23-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054767" version="1" comment="ofed-cxgb3-NIC-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.23-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054768" version="1" comment="ofed-cxgb3-NIC-kmp-rt_debug is &lt;1.3_2.6.22.19_0.23-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054769" version="1" comment="ofed-cxgb3-NIC-kmp-rt_timing is &lt;1.3_2.6.22.19_0.23-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054770" version="1" comment="ofed-doc is &lt;1.3-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054771" version="1" comment="ofed-kmp-rt is &lt;1.3_2.6.22.19_0.23-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054772" version="1" comment="ofed-kmp-rt_bigsmp is &lt;1.3_2.6.22.19_0.23-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054773" version="1" comment="ofed-kmp-rt_debug is &lt;1.3_2.6.22.19_0.23-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054774" version="1" comment="ofed-kmp-rt_timing is &lt;1.3_2.6.22.19_0.23-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054775" version="1" comment="ofed is &lt;1.3-0.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054938" version="1" comment="openldap2-back-meta is &lt;2.3.32-0.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054939" version="1" comment="openldap2-back-perl is &lt;2.3.32-0.34.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055932" version="1" comment="openldap2-back-meta is &lt;2.3.32-0.36.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055933" version="1" comment="openldap2-back-perl is &lt;2.3.32-0.36.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055927" version="1" comment="openldap2-client-32bit is &lt;2.3.32-0.36.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055934" version="1" comment="openldap2-client-64bit is &lt;2.3.32-0.36.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055935" version="1" comment="openldap2-client-x86 is &lt;2.3.32-0.36.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055928" version="1" comment="openldap2-client is &lt;2.3.32-0.36.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055929" version="1" comment="openldap2-devel-32bit is &lt;2.3.32-0.36.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055936" version="1" comment="openldap2-devel-64bit is &lt;2.3.32-0.36.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055930" version="1" comment="openldap2-devel is &lt;2.3.32-0.36.91" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055931" version="1" comment="openldap2 is &lt;2.3.32-0.36.50" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055800" version="1" comment="neon-32bit is &lt;0.24.7-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055803" version="1" comment="neon-64bit is &lt;0.24.7-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055804" version="1" comment="neon-x86 is &lt;0.24.7-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055802" version="1" comment="neon is &lt;0.24.7-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055801" version="1" comment="neon-devel is &lt;0.24.7-20.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053851" version="1" comment="cvs2svn is &lt;1.3.0-30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053849" version="1" comment="subversion-devel is &lt;1.3.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053852" version="1" comment="subversion-python is &lt;1.3.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053853" version="1" comment="subversion-server is &lt;1.3.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053854" version="1" comment="subversion-tools is &lt;1.3.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053850" version="1" comment="subversion is &lt;1.3.1-1.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053855" version="1" comment="viewcvs is &lt;1.0.5-0.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055550" version="1" comment="libapr-util1-devel-64bit is &lt;1.2.2-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055545" version="1" comment="libapr-util1-devel is &lt;1.2.2-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055552" version="1" comment="libapr1-devel-64bit is &lt;1.2.2-13.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055547" version="1" comment="libapr1-devel is &lt;1.2.2-13.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055557" version="1" comment="libapr-util1-64bit is &lt;1.2.2-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055558" version="1" comment="libapr-util1-devel-64bit is &lt;1.2.2-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055553" version="1" comment="libapr-util1-devel is &lt;1.2.2-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055554" version="1" comment="libapr-util1 is &lt;1.2.2-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055559" version="1" comment="libapr1-64bit is &lt;1.2.2-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055560" version="1" comment="libapr1-devel-64bit is &lt;1.2.2-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055555" version="1" comment="libapr1-devel is &lt;1.2.2-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055556" version="1" comment="libapr1 is &lt;1.2.2-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054825" version="1" comment="libxml-32bit is &lt;1.8.17-387.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054827" version="1" comment="libxml-64bit is &lt;1.8.17-387.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054828" version="1" comment="libxml-devel is &lt;1.8.17-387.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054829" version="1" comment="libxml-x86 is &lt;1.8.17-387.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054826" version="1" comment="libxml is &lt;1.8.17-387.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053922" version="1" comment="curl-devel is &lt;7.15.1-19.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057145" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057146" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057149" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057150" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057151" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057155" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057019" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057029" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057020" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057022" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057023" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057024" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057025" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057026" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057028" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr11-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056453" version="1" comment="ethereal-devel is &lt;0.10.14-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056452" version="1" comment="ethereal is &lt;0.10.14-16.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056459" version="1" comment="ethereal-devel is &lt;0.10.14-16.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054523" version="1" comment="ethereal-devel is &lt;0.10.14-16.37" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058914" version="1" comment="ethereal-devel is &lt;0.10.14-16.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058913" version="1" comment="ethereal is &lt;0.10.14-16.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058916" version="1" comment="ethereal-devel is &lt;0.10.14-16.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058915" version="1" comment="ethereal is &lt;0.10.14-16.40.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059072" version="1" comment="squid is &lt;2.5.STABLE12-18.13.982.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059073" version="1" comment="squid is &lt;2.5.STABLE12-18.13.982.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060286" version="1" comment="libicecore-devel is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060281" version="1" comment="libicecore is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060287" version="1" comment="libiiclib-devel is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060282" version="1" comment="libiiclib is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060288" version="1" comment="libiksemel-devel is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060283" version="1" comment="libiksemel is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060289" version="1" comment="libnetlib-devel is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060284" version="1" comment="libnetlib is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060290" version="1" comment="libxmlrpc-devel is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033750"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060285" version="1" comment="libxmlrpc is &lt;1.0.8-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054360" version="1" comment="xerces-j2-demo is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054361" version="1" comment="xerces-j2-javadoc-apis is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054362" version="1" comment="xerces-j2-javadoc-dom3 is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054363" version="1" comment="xerces-j2-javadoc-impl is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054364" version="1" comment="xerces-j2-javadoc-other is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054365" version="1" comment="xerces-j2-javadoc-xni is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054366" version="1" comment="xerces-j2-scripts is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054359" version="1" comment="xerces-j2 is &lt;2.7.1-16.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060392" version="1" comment="python-32bit is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060399" version="1" comment="python-64bit is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060393" version="1" comment="python-curses is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060400" version="1" comment="python-demo is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060394" version="1" comment="python-devel is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060395" version="1" comment="python-gdbm is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060401" version="1" comment="python-idle is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060396" version="1" comment="python-tk is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060402" version="1" comment="python-x86 is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060397" version="1" comment="python-xml is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060398" version="1" comment="python is &lt;2.4.2-18.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064564" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064565" version="1" comment="cyrus-imapd is &lt;2.2.12-27.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064566" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064567" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053995" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.0.13-0.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053996" version="1" comment="firefox3-atk-devel is &lt;1.12.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053997" version="1" comment="firefox3-atk-doc is &lt;1.12.3-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053998" version="1" comment="firefox3-cairo-devel is &lt;1.2.4-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053999" version="1" comment="firefox3-cairo-doc is &lt;1.2.4-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054000" version="1" comment="firefox3-glib2-devel is &lt;2.12.4-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054001" version="1" comment="firefox3-glib2-doc is &lt;2.12.4-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054002" version="1" comment="firefox3-gtk2-devel is &lt;2.10.6-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054003" version="1" comment="firefox3-gtk2-doc is &lt;2.10.6-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054004" version="1" comment="firefox3-pango-devel is &lt;1.14.5-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054005" version="1" comment="firefox3-pango-doc is &lt;1.14.5-0.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054006" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.13-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054007" version="1" comment="python-xpcom190 is &lt;1.9.0.13-1.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055868" version="1" comment="strongswan-doc is &lt;4.1.10-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055869" version="1" comment="strongswan is &lt;4.1.10-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061115" version="1" comment="libvorbis-32bit is &lt;1.1.2-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061117" version="1" comment="libvorbis-64bit is &lt;1.1.2-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061118" version="1" comment="libvorbis-x86 is &lt;1.1.2-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061116" version="1" comment="libvorbis is &lt;1.1.2-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009053826" version="1" comment="fetchmailconf is &lt;6.3.2-15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009036899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055242" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055243" version="1" comment="php5-bcmath is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055244" version="1" comment="php5-bz2 is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055245" version="1" comment="php5-calendar is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055246" version="1" comment="php5-ctype is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055247" version="1" comment="php5-curl is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055248" version="1" comment="php5-dba is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055249" version="1" comment="php5-dbase is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055250" version="1" comment="php5-devel is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055251" version="1" comment="php5-dom is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055252" version="1" comment="php5-exif is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055253" version="1" comment="php5-fastcgi is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055254" version="1" comment="php5-ftp is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055255" version="1" comment="php5-gd is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055256" version="1" comment="php5-gettext is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055257" version="1" comment="php5-gmp is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055258" version="1" comment="php5-iconv is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055259" version="1" comment="php5-imap is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055261" version="1" comment="php5-ldap is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055262" version="1" comment="php5-mbstring is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055263" version="1" comment="php5-mcrypt is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055264" version="1" comment="php5-mhash is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055265" version="1" comment="php5-mysql is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055266" version="1" comment="php5-ncurses is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055267" version="1" comment="php5-odbc is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055268" version="1" comment="php5-openssl is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055269" version="1" comment="php5-pcntl is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055270" version="1" comment="php5-pdo is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055271" version="1" comment="php5-pear is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055272" version="1" comment="php5-pgsql is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055273" version="1" comment="php5-posix is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055274" version="1" comment="php5-pspell is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055275" version="1" comment="php5-shmop is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055276" version="1" comment="php5-snmp is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055277" version="1" comment="php5-soap is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055278" version="1" comment="php5-sockets is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055279" version="1" comment="php5-sqlite is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055280" version="1" comment="php5-suhosin is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055281" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055282" version="1" comment="php5-sysvsem is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055283" version="1" comment="php5-sysvshm is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055290" version="1" comment="php5-tidy is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055284" version="1" comment="php5-tokenizer is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055285" version="1" comment="php5-wddx is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055286" version="1" comment="php5-xmlreader is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055287" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055288" version="1" comment="php5-xsl is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055289" version="1" comment="php5-zlib is &lt;5.2.5-9.22" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055970" version="1" comment="apache2-mod_php5 is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055971" version="1" comment="php5-bcmath is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055972" version="1" comment="php5-bz2 is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055973" version="1" comment="php5-calendar is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055974" version="1" comment="php5-ctype is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055975" version="1" comment="php5-curl is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055976" version="1" comment="php5-dba is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055977" version="1" comment="php5-dbase is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055978" version="1" comment="php5-devel is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055979" version="1" comment="php5-dom is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055980" version="1" comment="php5-exif is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055981" version="1" comment="php5-fastcgi is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055982" version="1" comment="php5-ftp is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055983" version="1" comment="php5-gd is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055984" version="1" comment="php5-gettext is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055985" version="1" comment="php5-gmp is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055986" version="1" comment="php5-iconv is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055987" version="1" comment="php5-imap is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055988" version="1" comment="php5-json is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055989" version="1" comment="php5-ldap is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055990" version="1" comment="php5-mbstring is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055991" version="1" comment="php5-mcrypt is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055992" version="1" comment="php5-mhash is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055993" version="1" comment="php5-mysql is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055994" version="1" comment="php5-ncurses is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055995" version="1" comment="php5-odbc is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055996" version="1" comment="php5-openssl is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055997" version="1" comment="php5-pcntl is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055998" version="1" comment="php5-pdo is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055999" version="1" comment="php5-pear is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056000" version="1" comment="php5-pgsql is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056001" version="1" comment="php5-posix is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056002" version="1" comment="php5-pspell is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056003" version="1" comment="php5-shmop is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056004" version="1" comment="php5-snmp is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056005" version="1" comment="php5-soap is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056006" version="1" comment="php5-sockets is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056007" version="1" comment="php5-sqlite is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056008" version="1" comment="php5-suhosin is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056009" version="1" comment="php5-sysvmsg is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056010" version="1" comment="php5-sysvsem is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056011" version="1" comment="php5-sysvshm is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056012" version="1" comment="php5-tokenizer is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056013" version="1" comment="php5-wddx is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056014" version="1" comment="php5-xmlreader is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056015" version="1" comment="php5-xmlrpc is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056016" version="1" comment="php5-xsl is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056017" version="1" comment="php5-zlib is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056018" version="1" comment="php5-tidy is &lt;5.2.5-9.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054273" version="1" comment="xemacs-el is &lt;21.5.25.20060327-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054271" version="1" comment="xemacs-info is &lt;21.5.25.20060327-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054272" version="1" comment="xemacs is &lt;21.5.25.20060327-7.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059970" version="1" comment="tomcat5-admin-webapps is &lt;5.0.30-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059971" version="1" comment="tomcat5-webapps is &lt;5.0.30-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059972" version="1" comment="tomcat5 is &lt;5.0.30-27.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054492" version="1" comment="finch-devel is &lt;2.3.1-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054489" version="1" comment="finch is &lt;2.3.1-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054493" version="1" comment="libpurple-devel is &lt;2.3.1-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054490" version="1" comment="libpurple is &lt;2.3.1-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054494" version="1" comment="pidgin-devel is &lt;2.3.1-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054491" version="1" comment="pidgin is &lt;2.3.1-10.19" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054415" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054416" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054414" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009054420" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055591" version="1" comment="libmsrpc-devel is &lt;3.0.32-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055592" version="1" comment="libmsrpc is &lt;3.0.32-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055581" version="1" comment="libsmbclient-devel is &lt;3.0.32-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055602" version="1" comment="libsmbsharemodes-devel is &lt;3.0.32-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055603" version="1" comment="libsmbsharemodes is &lt;3.0.32-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055598" version="1" comment="samba-python is &lt;3.0.32-0.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055614" version="1" comment="cifs-mount is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055615" version="1" comment="ldapsmb is &lt;1.34b-25.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055627" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055628" version="1" comment="libmsrpc is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055616" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055629" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055617" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055630" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055618" version="1" comment="libsmbclient is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055619" version="1" comment="samba-32bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055631" version="1" comment="samba-64bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055620" version="1" comment="samba-client-32bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055632" version="1" comment="samba-client-64bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055633" version="1" comment="samba-client-x86 is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055621" version="1" comment="samba-client is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055622" version="1" comment="samba-krb-printing is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055634" version="1" comment="samba-python is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055623" version="1" comment="samba-vscan is &lt;0.3.6b-43.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055624" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055635" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055636" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055625" version="1" comment="samba-winbind is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055637" version="1" comment="samba-x86 is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055626" version="1" comment="samba is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055758" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055759" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055760" version="1" comment="libnewt0_52 is &lt;0.52.10-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055761" version="1" comment="newt-devel is &lt;0.52.10-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055762" version="1" comment="newt-doc is &lt;0.52.10-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055763" version="1" comment="newt is &lt;0.52.10-7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056811" version="1" comment="finch-devel is &lt;2.6.3-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056808" version="1" comment="finch is &lt;2.6.3-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056812" version="1" comment="libpurple-devel is &lt;2.6.3-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056809" version="1" comment="libpurple is &lt;2.6.3-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056813" version="1" comment="pidgin-devel is &lt;2.6.3-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056810" version="1" comment="pidgin is &lt;2.6.3-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056817" version="1" comment="finch-devel is &lt;2.6.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056814" version="1" comment="finch is &lt;2.6.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056818" version="1" comment="libpurple-devel is &lt;2.6.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056815" version="1" comment="libpurple is &lt;2.6.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056819" version="1" comment="pidgin-devel is &lt;2.6.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056816" version="1" comment="pidgin is &lt;2.6.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056911" version="1" comment="htmldoc is &lt;1.8.25-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055377" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.3-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055378" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.14-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055379" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.3-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055380" version="1" comment="python-xpcom190 is &lt;1.9.0.14-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055381" version="1" comment="python-xpcom191 is &lt;1.9.1.3-1.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055434" version="1" comment="MozillaFirefox-branding-SLED is &lt;3.5-1.6.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055435" version="1" comment="MozillaFirefox-translations is &lt;3.5.3-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055436" version="1" comment="MozillaFirefox is &lt;3.5.3-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055437" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055438" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055439" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055440" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055441" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055442" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055443" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055444" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055445" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055446" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055447" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055448" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055764" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.3-1.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055765" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055766" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055767" version="1" comment="python-xpcom190 is &lt;1.9.0.14-0.6.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055768" version="1" comment="python-xpcom191 is &lt;1.9.1.3-1.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055870" version="1" comment="freeradius-devel is &lt;1.1.7-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055871" version="1" comment="freeradius is &lt;1.1.7-21.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055117" version="1" comment="freeradius-devel is &lt;1.1.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055118" version="1" comment="freeradius is &lt;1.1.0-19.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055452" version="1" comment="postgresql-contrib is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055449" version="1" comment="postgresql-devel is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055453" version="1" comment="postgresql-docs is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055450" version="1" comment="postgresql-libs-32bit is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055454" version="1" comment="postgresql-libs-64bit is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055455" version="1" comment="postgresql-libs-x86 is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055451" version="1" comment="postgresql-libs is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055456" version="1" comment="postgresql-pl is &lt;8.1.18-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055457" version="1" comment="postgresql-server is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055458" version="1" comment="postgresql is &lt;8.1.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055051" version="1" comment="postgresql-contrib is &lt;8.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055048" version="1" comment="postgresql-devel is &lt;8.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055052" version="1" comment="postgresql-docs is &lt;8.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055055" version="1" comment="postgresql-pl is &lt;8.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055056" version="1" comment="postgresql-server is &lt;8.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055057" version="1" comment="postgresql is &lt;8.1.18-0.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055808" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055809" version="1" comment="cyrus-imapd is &lt;2.2.12-27.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055810" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055811" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055817" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055818" version="1" comment="cyrus-imapd is &lt;2.2.12-27.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055819" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009055820" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059228" version="1" comment="openssl-32bit is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059232" version="1" comment="openssl-64bit is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059229" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059233" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059230" version="1" comment="openssl-devel is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059234" version="1" comment="openssl-doc is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059235" version="1" comment="openssl-x86 is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059231" version="1" comment="openssl is &lt;0.9.8a-18.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059236" version="1" comment="openssl-32bit is &lt;0.9.8a-18.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059237" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059238" version="1" comment="openssl-devel is &lt;0.9.8a-18.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059242" version="1" comment="openssl-doc is &lt;0.9.8a-18.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059239" version="1" comment="openssl is &lt;0.9.8a-18.39.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060030" version="1" comment="fuse-devel is &lt;2.7.2-15.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060031" version="1" comment="fuse is &lt;2.7.2-15.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060032" version="1" comment="libfuse2 is &lt;2.7.2-15.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060033" version="1" comment="fuse-devel is &lt;2.7.2-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060034" version="1" comment="fuse is &lt;2.7.2-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060035" version="1" comment="libfuse2 is &lt;2.7.2-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057947" version="1" comment="fuse-devel is &lt;2.7.2-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057948" version="1" comment="fuse is &lt;2.7.2-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057949" version="1" comment="libfuse2 is &lt;2.7.2-15.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057950" version="1" comment="fuse-devel is &lt;2.7.2-15.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057951" version="1" comment="fuse is &lt;2.7.2-15.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057952" version="1" comment="libfuse2 is &lt;2.7.2-15.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056915" version="1" comment="MozillaFirefox-translations is &lt;3.5.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056916" version="1" comment="MozillaFirefox is &lt;3.5.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056917" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056918" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056919" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056920" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056921" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056922" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056923" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056924" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056925" version="1" comment="python-xpcom191 is &lt;1.9.1.6-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060882" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.4-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060883" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.4-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060884" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.4-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061143" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061154" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061144" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061145" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061147" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061148" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061149" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061150" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061151" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061153" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr11.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059549" version="1" comment="mozilla-nspr-32bit is &lt;4.8.2-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059550" version="1" comment="mozilla-nspr-devel is &lt;4.8.2-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059551" version="1" comment="mozilla-nspr is &lt;4.8.2-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059552" version="1" comment="mozilla-nss-32bit is &lt;3.12.6-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059553" version="1" comment="mozilla-nss-devel is &lt;3.12.6-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059555" version="1" comment="mozilla-nss is &lt;3.12.6-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059554" version="1" comment="mozilla-nss-tools is &lt;3.12.6-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070720" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070731" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070721" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070722" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070724" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070725" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070726" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070727" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070728" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070730" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr12.2-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059561" version="1" comment="mozilla-nss-32bit is &lt;3.12.6-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059559" version="1" comment="mozilla-nss-64bit is &lt;3.12.6-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059560" version="1" comment="mozilla-nss-x86 is &lt;3.12.6-3.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065195" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065190" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065191" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065192" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059562" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059563" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059564" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059565" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059566" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059567" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059568" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059569" version="1" comment="python-xpcom190 is &lt;1.9.0.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065651" version="1" comment="gnutls-32bit is &lt;1.2.10-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065655" version="1" comment="gnutls-64bit is &lt;1.2.10-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065652" version="1" comment="gnutls-devel-32bit is &lt;1.2.10-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065656" version="1" comment="gnutls-devel-64bit is &lt;1.2.10-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065653" version="1" comment="gnutls-devel is &lt;1.2.10-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065657" version="1" comment="gnutls-x86 is &lt;1.2.10-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065654" version="1" comment="gnutls is &lt;1.2.10-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065628" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065629" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065630" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065631" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065632" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065633" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065634" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065635" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065636" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065637" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065638" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.0-1.4.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056273" version="1" comment="openssl-doc is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059570" version="1" comment="MozillaFirefox-translations is &lt;3.5.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059571" version="1" comment="MozillaFirefox is &lt;3.5.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059572" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059573" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059574" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059575" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059576" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059577" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059578" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.9-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059579" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059580" version="1" comment="python-xpcom191 is &lt;1.9.1.9-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056263" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056265" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056266" version="1" comment="compat-openssl097g-x86 is &lt;0.9.7g-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056264" version="1" comment="compat-openssl097g is &lt;0.9.7g-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056267" version="1" comment="openssl-32bit is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056271" version="1" comment="openssl-64bit is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056268" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056272" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056269" version="1" comment="openssl-devel is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056274" version="1" comment="openssl-x86 is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056270" version="1" comment="openssl is &lt;0.9.8a-18.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057700" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057701" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057698" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057699" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059219" version="1" comment="kernel-debug is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059203" version="1" comment="kernel-default is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059205" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059217" version="1" comment="kernel-smp is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059207" version="1" comment="kernel-source is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059208" version="1" comment="kernel-syms is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059218" version="1" comment="kernel-xen is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059220" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059222" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059223" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059224" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059221" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057694" version="1" comment="kernel-default is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057695" version="1" comment="kernel-smp is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057696" version="1" comment="kernel-source is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057697" version="1" comment="kernel-syms is &lt;2.6.16.60-0.42.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059204" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059206" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057235" version="1" comment="expat-32bit is &lt;2.0.0-13.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057236" version="1" comment="expat is &lt;2.0.0-13.7.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056875" version="1" comment="pyxml is &lt;0.8.4-17.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057249" version="1" comment="expat-32bit is &lt;2.0.0-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057251" version="1" comment="expat-64bit is &lt;2.0.0-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057252" version="1" comment="expat-x86 is &lt;2.0.0-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057250" version="1" comment="expat is &lt;2.0.0-13.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056853" version="1" comment="expat-32bit is &lt;2.0.0-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056855" version="1" comment="expat-64bit is &lt;2.0.0-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056856" version="1" comment="expat-x86 is &lt;2.0.0-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056854" version="1" comment="expat is &lt;2.0.0-13.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059506" version="1" comment="xntp-doc is &lt;4.2.4p3-48.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059505" version="1" comment="xntp is &lt;4.2.4p3-48.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056881" version="1" comment="xntp-doc is &lt;4.2.4p3-48.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056880" version="1" comment="xntp is &lt;4.2.4p3-48.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056062" version="1" comment="xpdf is &lt;3.01-21.22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056063" version="1" comment="xpdf-tools is &lt;3.01-21.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056064" version="1" comment="xpdf is &lt;3.01-21.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059508" version="1" comment="poppler-glib is &lt;0.4.4-19.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059509" version="1" comment="poppler-qt is &lt;0.4.4-19.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059510" version="1" comment="poppler is &lt;0.4.4-19.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059507" version="1" comment="poppler-devel is &lt;0.4.4-19.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056247" version="1" comment="kdegraphics3-pdf is &lt;3.5.1-23.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057082" version="1" comment="poppler-glib is &lt;0.4.4-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057083" version="1" comment="poppler-qt is &lt;0.4.4-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057084" version="1" comment="poppler is &lt;0.4.4-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057081" version="1" comment="poppler-devel is &lt;0.4.4-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056929" version="1" comment="cups-client is &lt;1.1.23-40.57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056930" version="1" comment="cups-devel is &lt;1.1.23-40.57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056931" version="1" comment="cups-libs-32bit is &lt;1.1.23-40.57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056932" version="1" comment="cups-libs is &lt;1.1.23-40.57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056933" version="1" comment="cups is &lt;1.1.23-40.57.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056936" version="1" comment="cups-client is &lt;1.1.23-40.59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056937" version="1" comment="cups-devel is &lt;1.1.23-40.59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056938" version="1" comment="cups-libs-32bit is &lt;1.1.23-40.59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056941" version="1" comment="cups-libs-64bit is &lt;1.1.23-40.59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056942" version="1" comment="cups-libs-x86 is &lt;1.1.23-40.59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056939" version="1" comment="cups-libs is &lt;1.1.23-40.59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056940" version="1" comment="cups is &lt;1.1.23-40.59.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056805" version="1" comment="perl-HTML-Parser is &lt;3.48-12.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056341" version="1" comment="expat-32bit is &lt;2.0.0-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056343" version="1" comment="expat-64bit is &lt;2.0.0-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056344" version="1" comment="expat-x86 is &lt;2.0.0-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056342" version="1" comment="expat is &lt;2.0.0-13.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057125" version="1" comment="libtool-32bit is &lt;1.5.22-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057127" version="1" comment="libtool-64bit is &lt;1.5.22-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057128" version="1" comment="libtool-x86 is &lt;1.5.22-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057126" version="1" comment="libtool is &lt;1.5.22-13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073813" version="1" comment="ghostscript-fonts-other is &lt;8.15.4-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073818" version="1" comment="ghostscript-fonts-rus is &lt;8.15.4-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073814" version="1" comment="ghostscript-fonts-std is &lt;8.15.4-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073815" version="1" comment="ghostscript-library is &lt;8.15.4-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073819" version="1" comment="ghostscript-omni is &lt;8.15.4-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073816" version="1" comment="ghostscript-x11 is &lt;8.15.4-16.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073820" version="1" comment="libgimpprint-devel is &lt;4.2.7-62.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073817" version="1" comment="libgimpprint is &lt;4.2.7-62.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057180" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057183" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057181" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057182" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.3-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056361" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056362" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056363" version="1" comment="python-xpcom191 is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056353" version="1" comment="MozillaFirefox-translations is &lt;3.5.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056354" version="1" comment="MozillaFirefox is &lt;3.5.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056355" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056356" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056357" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056358" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056359" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056360" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.5-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056945" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056946" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056947" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056948" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056949" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056950" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056951" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009056952" version="1" comment="python-xpcom190 is &lt;1.9.0.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060140" version="1" comment="libmikmod-32bit is &lt;3.1.11-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060142" version="1" comment="libmikmod-64bit is &lt;3.1.11-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031232"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060143" version="1" comment="libmikmod-x86 is &lt;3.1.11-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060141" version="1" comment="libmikmod is &lt;3.1.11-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109192" version="1" comment="kernel-debug is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109193" version="1" comment="kernel-default is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109194" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109195" version="1" comment="kernel-smp is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109196" version="1" comment="kernel-source is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109197" version="1" comment="kernel-syms is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109198" version="1" comment="kernel-xen is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104307" version="1" comment="kernel-default is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104308" version="1" comment="kernel-source is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104309" version="1" comment="kernel-syms is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060296" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060291" version="1" comment="kernel-default is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060297" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060294" version="1" comment="kernel-smp is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060292" version="1" comment="kernel-source is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060293" version="1" comment="kernel-syms is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060295" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060299" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109199" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109200" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109201" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109202" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109203" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.132.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104310" version="1" comment="kernel-debug is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104311" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104312" version="1" comment="kernel-smp is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104313" version="1" comment="kernel-xen is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104314" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104315" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104316" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104317" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104318" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057305" version="1" comment="postgresql-contrib is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057302" version="1" comment="postgresql-devel is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057306" version="1" comment="postgresql-docs is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057303" version="1" comment="postgresql-libs-32bit is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057304" version="1" comment="postgresql-libs is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057309" version="1" comment="postgresql-pl is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057310" version="1" comment="postgresql-server is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057311" version="1" comment="postgresql is &lt;8.1.19-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057315" version="1" comment="postgresql-contrib is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057312" version="1" comment="postgresql-devel is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057316" version="1" comment="postgresql-docs is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057313" version="1" comment="postgresql-libs-32bit is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057317" version="1" comment="postgresql-libs-64bit is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057318" version="1" comment="postgresql-libs-x86 is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057314" version="1" comment="postgresql-libs is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057319" version="1" comment="postgresql-pl is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057320" version="1" comment="postgresql-server is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057321" version="1" comment="postgresql is &lt;8.1.19-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071612" version="1" comment="kernel-debug is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071613" version="1" comment="kernel-default is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071614" version="1" comment="kernel-source is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071615" version="1" comment="kernel-syms is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071616" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071620" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071621" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071617" version="1" comment="kernel-smp is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071622" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071623" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071618" version="1" comment="kernel-xen is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071619" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071624" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071625" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065575" version="1" comment="python-32bit is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065582" version="1" comment="python-64bit is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065576" version="1" comment="python-curses is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065583" version="1" comment="python-demo is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065577" version="1" comment="python-devel is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065578" version="1" comment="python-gdbm is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065584" version="1" comment="python-idle is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065579" version="1" comment="python-tk is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065585" version="1" comment="python-x86 is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065580" version="1" comment="python-xml is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065581" version="1" comment="python is &lt;2.4.2-18.32.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057380" version="1" comment="krb5-32bit is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057386" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057387" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057381" version="1" comment="krb5-client is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057382" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057383" version="1" comment="krb5-devel is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057389" version="1" comment="krb5-server is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057384" version="1" comment="krb5 is &lt;1.4.3-19.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057391" version="1" comment="krb5-32bit is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057396" version="1" comment="krb5-64bit is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057397" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057398" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057392" version="1" comment="krb5-client is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057393" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057399" version="1" comment="krb5-devel-64bit is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057394" version="1" comment="krb5-devel is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057400" version="1" comment="krb5-server is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057401" version="1" comment="krb5-x86 is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057395" version="1" comment="krb5 is &lt;1.4.3-19.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058552" version="1" comment="rubygem-actionpack-1_12 is &lt;1.12.5-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033084"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058595" version="1" comment="libnetpbm-32bit is &lt;1.0.0-657.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058596" version="1" comment="libnetpbm is &lt;1.0.0-657.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058597" version="1" comment="netpbm is &lt;10.26.22-14.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058598" version="1" comment="libnetpbm-64bit is &lt;1.0.0-657.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058599" version="1" comment="libnetpbm-x86 is &lt;1.0.0-657.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059511" version="1" comment="openssl-32bit is &lt;0.9.8a-18.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059512" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059513" version="1" comment="openssl-devel is &lt;0.9.8a-18.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059517" version="1" comment="openssl-doc is &lt;0.9.8a-18.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059514" version="1" comment="openssl is &lt;0.9.8a-18.39.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057482" version="1" comment="openssl-32bit is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057486" version="1" comment="openssl-64bit is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057483" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057487" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057484" version="1" comment="openssl-devel is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057488" version="1" comment="openssl-doc is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057489" version="1" comment="openssl-x86 is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057485" version="1" comment="openssl is &lt;0.9.8a-18.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069260" version="1" comment="kernel-debug is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069261" version="1" comment="kernel-default is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069262" version="1" comment="kernel-source is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069263" version="1" comment="kernel-syms is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069264" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069265" version="1" comment="kernel-smp is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069266" version="1" comment="kernel-xen is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057413" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057420" version="1" comment="kernel-debug is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057414" version="1" comment="kernel-default is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057421" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057422" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057415" version="1" comment="kernel-smp is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057416" version="1" comment="kernel-source is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057417" version="1" comment="kernel-syms is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057423" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057424" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057418" version="1" comment="kernel-xen is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057419" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059519" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059520" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069267" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069268" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069269" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069270" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069271" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069272" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069273" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059934" version="1" comment="kernel-debug is &lt;2.6.16.60-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059929" version="1" comment="kernel-default is &lt;2.6.16.60-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059935" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059930" version="1" comment="kernel-smp is &lt;2.6.16.60-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059931" version="1" comment="kernel-source is &lt;2.6.16.60-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059932" version="1" comment="kernel-syms is &lt;2.6.16.60-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059933" version="1" comment="kernel-xen is &lt;2.6.16.60-0.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058484" version="1" comment="sendmail-devel is &lt;8.13.6-9.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058483" version="1" comment="sendmail is &lt;8.13.6-9.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058485" version="1" comment="uucp is &lt;1.07-268.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058486" version="1" comment="uucp is &lt;1.07-268.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069638" version="1" comment="libsndfile-32bit is &lt;1.0.12-13.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069641" version="1" comment="libsndfile-64bit is &lt;1.0.12-13.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069639" version="1" comment="libsndfile-devel is &lt;1.0.12-13.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069642" version="1" comment="libsndfile-x86 is &lt;1.0.12-13.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069640" version="1" comment="libsndfile is &lt;1.0.12-13.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072262" version="1" comment="namazu is &lt;2.0.18-24.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104319" version="1" comment="glibc-32bit is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104320" version="1" comment="glibc-devel-32bit is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104321" version="1" comment="glibc-devel is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104322" version="1" comment="glibc-html is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104323" version="1" comment="glibc-i18ndata is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104324" version="1" comment="glibc-info is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104325" version="1" comment="glibc-locale-32bit is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104326" version="1" comment="glibc-locale is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104327" version="1" comment="glibc-profile-32bit is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104328" version="1" comment="glibc-profile is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104329" version="1" comment="glibc is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104330" version="1" comment="nscd is &lt;2.4-31.77.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072376" version="1" comment="glibc-32bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072386" version="1" comment="glibc-64bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072377" version="1" comment="glibc-devel-32bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072387" version="1" comment="glibc-devel-64bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072378" version="1" comment="glibc-devel is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072379" version="1" comment="glibc-html is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072380" version="1" comment="glibc-i18ndata is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072381" version="1" comment="glibc-info is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072382" version="1" comment="glibc-locale-32bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072388" version="1" comment="glibc-locale-64bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072389" version="1" comment="glibc-locale-x86 is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072383" version="1" comment="glibc-locale is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072390" version="1" comment="glibc-profile-32bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072391" version="1" comment="glibc-profile-64bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072392" version="1" comment="glibc-profile-x86 is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072393" version="1" comment="glibc-profile is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072394" version="1" comment="glibc-x86 is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072384" version="1" comment="glibc is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072385" version="1" comment="nscd is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072395" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072396" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072397" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072398" version="1" comment="glibc-dceext is &lt;2.4-31.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104331" version="1" comment="gnutls-32bit is &lt;1.2.10-13.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104332" version="1" comment="gnutls-devel-32bit is &lt;1.2.10-13.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104333" version="1" comment="gnutls-devel is &lt;1.2.10-13.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104334" version="1" comment="gnutls is &lt;1.2.10-13.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057497" version="1" comment="gzip is &lt;1.3.5-159.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030647"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037658"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068517" version="1" comment="kernel-debug is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068511" version="1" comment="kernel-default is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068515" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070732" version="1" comment="kernel-smp is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068512" version="1" comment="kernel-source is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068513" version="1" comment="kernel-syms is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070733" version="1" comment="kernel-xen is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068514" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068516" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070734" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070736" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070737" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070738" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070735" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058529" version="1" comment="finch-devel is &lt;2.6.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058526" version="1" comment="finch is &lt;2.6.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058530" version="1" comment="libpurple-devel is &lt;2.6.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058527" version="1" comment="libpurple is &lt;2.6.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058531" version="1" comment="pidgin-devel is &lt;2.6.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058528" version="1" comment="pidgin is &lt;2.6.6-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062189" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062190" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062191" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062192" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.5-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059973" version="1" comment="clamav is &lt;0.96-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059845" version="1" comment="clamav is &lt;0.96-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065407" version="1" comment="MozillaFirefox-translations is &lt;3.5.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065408" version="1" comment="MozillaFirefox is &lt;3.5.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065409" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065410" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065411" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065412" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065413" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065414" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065415" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065416" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065417" version="1" comment="python-xpcom191 is &lt;1.9.1.16-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060304" version="1" comment="libpng-32bit is &lt;1.2.8-19.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060308" version="1" comment="libpng-64bit is &lt;1.2.8-19.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060305" version="1" comment="libpng-devel-32bit is &lt;1.2.8-19.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060309" version="1" comment="libpng-devel-64bit is &lt;1.2.8-19.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060306" version="1" comment="libpng-devel is &lt;1.2.8-19.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060310" version="1" comment="libpng-x86 is &lt;1.2.8-19.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060307" version="1" comment="libpng is &lt;1.2.8-19.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062058" version="1" comment="openldap2-back-meta is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062059" version="1" comment="openldap2-back-perl is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030813"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062053" version="1" comment="openldap2-client-32bit is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062060" version="1" comment="openldap2-client-64bit is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031161"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062061" version="1" comment="openldap2-client-x86 is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062054" version="1" comment="openldap2-client is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062055" version="1" comment="openldap2-devel-32bit is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062062" version="1" comment="openldap2-devel-64bit is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062056" version="1" comment="openldap2-devel is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062057" version="1" comment="openldap2 is &lt;2.3.32-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030656"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057647" version="1" comment="mozilla-xulrunner190-32bit is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057648" version="1" comment="mozilla-xulrunner190-gnomevfs-32bit is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057649" version="1" comment="mozilla-xulrunner190-gnomevfs is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057650" version="1" comment="mozilla-xulrunner190-translations-32bit is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057651" version="1" comment="mozilla-xulrunner190-translations is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057652" version="1" comment="mozilla-xulrunner190 is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057653" version="1" comment="mozilla-xulrunner190-devel is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057654" version="1" comment="python-xpcom190 is &lt;1.9.0.17-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057660" version="1" comment="MozillaFirefox-translations is &lt;3.5.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057661" version="1" comment="MozillaFirefox is &lt;3.5.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057662" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057663" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057664" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057665" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057666" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057667" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057668" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057669" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057670" version="1" comment="python-xpcom191 is &lt;1.9.1.7-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057254" version="1" comment="postfix is &lt;2.5.6-4.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057766" version="1" comment="lighttpd-mod_cml is &lt;1.4.10-11.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057767" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.10-11.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057768" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.10-11.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057769" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.10-11.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057770" version="1" comment="lighttpd-mod_webdav is &lt;1.4.10-11.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057771" version="1" comment="lighttpd is &lt;1.4.10-11.28.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057772" version="1" comment="lighttpd-mod_cml is &lt;1.4.10-11.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057773" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.10-11.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057774" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.10-11.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057775" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.10-11.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057776" version="1" comment="lighttpd-mod_webdav is &lt;1.4.10-11.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009057777" version="1" comment="lighttpd is &lt;1.4.10-11.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061722" version="1" comment="OpenOffice_org-cs is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061724" version="1" comment="OpenOffice_org-de is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061727" version="1" comment="OpenOffice_org-es is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061729" version="1" comment="OpenOffice_org-fr is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061730" version="1" comment="OpenOffice_org-galleries is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061731" version="1" comment="OpenOffice_org-gnome is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061734" version="1" comment="OpenOffice_org-hu is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061735" version="1" comment="OpenOffice_org-it is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061736" version="1" comment="OpenOffice_org-ja is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061737" version="1" comment="OpenOffice_org-kde is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061739" version="1" comment="OpenOffice_org-mono is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061744" version="1" comment="OpenOffice_org-pl is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061745" version="1" comment="OpenOffice_org-pt-BR is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061747" version="1" comment="OpenOffice_org-sk is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061750" version="1" comment="OpenOffice_org-zh-CN is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061751" version="1" comment="OpenOffice_org-zh-TW is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061753" version="1" comment="OpenOffice_org is &lt;3.2.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062564" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062565" version="1" comment="php5-bcmath is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062566" version="1" comment="php5-bz2 is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062567" version="1" comment="php5-calendar is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062568" version="1" comment="php5-ctype is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062569" version="1" comment="php5-curl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062570" version="1" comment="php5-dba is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062571" version="1" comment="php5-dbase is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062572" version="1" comment="php5-devel is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062573" version="1" comment="php5-dom is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062574" version="1" comment="php5-exif is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062575" version="1" comment="php5-fastcgi is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062576" version="1" comment="php5-ftp is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062577" version="1" comment="php5-gd is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062578" version="1" comment="php5-gettext is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062579" version="1" comment="php5-gmp is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062580" version="1" comment="php5-hash is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062581" version="1" comment="php5-iconv is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062582" version="1" comment="php5-imap is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062583" version="1" comment="php5-json is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062584" version="1" comment="php5-ldap is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062585" version="1" comment="php5-mbstring is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062586" version="1" comment="php5-mcrypt is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062587" version="1" comment="php5-mhash is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062588" version="1" comment="php5-mysql is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062589" version="1" comment="php5-ncurses is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062590" version="1" comment="php5-odbc is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062591" version="1" comment="php5-openssl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062592" version="1" comment="php5-pcntl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062593" version="1" comment="php5-pdo is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062594" version="1" comment="php5-pear is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062595" version="1" comment="php5-pgsql is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062596" version="1" comment="php5-posix is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062597" version="1" comment="php5-pspell is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062598" version="1" comment="php5-shmop is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062599" version="1" comment="php5-snmp is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062600" version="1" comment="php5-soap is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062601" version="1" comment="php5-sockets is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062602" version="1" comment="php5-sqlite is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062603" version="1" comment="php5-suhosin is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062604" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062605" version="1" comment="php5-sysvsem is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062606" version="1" comment="php5-sysvshm is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062607" version="1" comment="php5-tokenizer is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062608" version="1" comment="php5-wddx is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062609" version="1" comment="php5-xmlreader is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062610" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062611" version="1" comment="php5-xsl is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062612" version="1" comment="php5-zlib is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062613" version="1" comment="php5-tidy is &lt;5.2.14-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038471"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063225" version="1" comment="bzip2-32bit is &lt;1.0.3-17.15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063227" version="1" comment="bzip2-64bit is &lt;1.0.3-17.15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063228" version="1" comment="bzip2-x86 is &lt;1.0.3-17.15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063226" version="1" comment="bzip2 is &lt;1.0.3-17.15.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062688" version="1" comment="pcsc-lite-devel is &lt;1.2.9_beta9-17.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062689" version="1" comment="pcsc-lite is &lt;1.2.9_beta9-17.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059937" version="1" comment="apache2-devel is &lt;2.2.3-16.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059938" version="1" comment="apache2-doc is &lt;2.2.3-16.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059939" version="1" comment="apache2-example-pages is &lt;2.2.3-16.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059940" version="1" comment="apache2-prefork is &lt;2.2.3-16.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059941" version="1" comment="apache2-worker is &lt;2.2.3-16.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059942" version="1" comment="apache2 is &lt;2.2.3-16.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059943" version="1" comment="apache2-devel is &lt;2.2.3-16.25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059944" version="1" comment="apache2-doc is &lt;2.2.3-16.25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059945" version="1" comment="apache2-example-pages is &lt;2.2.3-16.25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059946" version="1" comment="apache2-prefork is &lt;2.2.3-16.25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059947" version="1" comment="apache2-worker is &lt;2.2.3-16.25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059948" version="1" comment="apache2 is &lt;2.2.3-16.25.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059696" version="1" comment="pango-32bit is &lt;1.10.2-23.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059697" version="1" comment="pango-devel is &lt;1.10.2-23.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059698" version="1" comment="pango-doc is &lt;1.10.2-23.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059699" version="1" comment="pango is &lt;1.10.2-23.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059701" version="1" comment="pango-devel-64bit is &lt;1.10.2-23.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059703" version="1" comment="pango-32bit is &lt;1.10.2-23.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059707" version="1" comment="pango-64bit is &lt;1.10.2-23.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059708" version="1" comment="pango-devel-64bit is &lt;1.10.2-23.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059704" version="1" comment="pango-devel is &lt;1.10.2-23.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059705" version="1" comment="pango-doc is &lt;1.10.2-23.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059709" version="1" comment="pango-x86 is &lt;1.10.2-23.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059706" version="1" comment="pango is &lt;1.10.2-23.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058937" version="1" comment="cron is &lt;4.1-45.27.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058938" version="1" comment="cron is &lt;4.1-45.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058646" version="1" comment="sudo is &lt;1.6.8p12-18.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009058662" version="1" comment="sudo is &lt;1.6.8p12-18.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059738" version="1" comment="fileshareset is &lt;2.0-84.74.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059739" version="1" comment="kdebase3-32bit is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059741" version="1" comment="kdebase3-devel is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059749" version="1" comment="kdebase3-extra is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059742" version="1" comment="kdebase3-kdm is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059743" version="1" comment="kdebase3-ksysguardd is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059750" version="1" comment="kdebase3-nsplugin64 is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059744" version="1" comment="kdebase3-nsplugin is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059745" version="1" comment="kdebase3-samba is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059746" version="1" comment="kdebase3-session is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059747" version="1" comment="kdebase3 is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059740" version="1" comment="kdebase3-beagle is &lt;3.5.1-69.75.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059752" version="1" comment="fileshareset is &lt;2.0-84.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059753" version="1" comment="kdebase3-32bit is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059762" version="1" comment="kdebase3-64bit is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059755" version="1" comment="kdebase3-devel is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031092"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059763" version="1" comment="kdebase3-extra is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059756" version="1" comment="kdebase3-kdm is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059757" version="1" comment="kdebase3-ksysguardd is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059764" version="1" comment="kdebase3-nsplugin64 is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059758" version="1" comment="kdebase3-nsplugin is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059759" version="1" comment="kdebase3-samba is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059760" version="1" comment="kdebase3-session is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059765" version="1" comment="kdebase3-x86 is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059761" version="1" comment="kdebase3 is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059754" version="1" comment="kdebase3-beagle is &lt;3.5.1-69.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071180" version="1" comment="cups-client is &lt;1.1.23-40.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071181" version="1" comment="cups-devel is &lt;1.1.23-40.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071182" version="1" comment="cups-libs-32bit is &lt;1.1.23-40.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071185" version="1" comment="cups-libs-64bit is &lt;1.1.23-40.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071186" version="1" comment="cups-libs-x86 is &lt;1.1.23-40.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071183" version="1" comment="cups-libs is &lt;1.1.23-40.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071184" version="1" comment="cups is &lt;1.1.23-40.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064812" version="1" comment="cups-client is &lt;1.1.23-40.60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064813" version="1" comment="cups-devel is &lt;1.1.23-40.60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064814" version="1" comment="cups-libs-32bit is &lt;1.1.23-40.60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064817" version="1" comment="cups-libs-64bit is &lt;1.1.23-40.60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064818" version="1" comment="cups-libs-x86 is &lt;1.1.23-40.60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064815" version="1" comment="cups-libs is &lt;1.1.23-40.60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064816" version="1" comment="cups is &lt;1.1.23-40.60.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059361" version="1" comment="cifs-mount is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059373" version="1" comment="libmsrpc-devel is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059374" version="1" comment="libmsrpc is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059362" version="1" comment="libsmbclient-32bit is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059363" version="1" comment="libsmbclient-devel is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059364" version="1" comment="libsmbclient is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059365" version="1" comment="samba-32bit is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059366" version="1" comment="samba-client-32bit is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059367" version="1" comment="samba-client is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059368" version="1" comment="samba-krb-printing is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059380" version="1" comment="samba-python is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059369" version="1" comment="samba-vscan is &lt;0.3.6b-42.85.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059370" version="1" comment="samba-winbind-32bit is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059371" version="1" comment="samba-winbind is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059372" version="1" comment="samba is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059384" version="1" comment="libsmbsharemodes-devel is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059385" version="1" comment="libsmbsharemodes is &lt;3.0.32-0.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059386" version="1" comment="cifs-mount is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059387" version="1" comment="ldapsmb is &lt;1.34b-25.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059399" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059400" version="1" comment="libmsrpc is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059388" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059401" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059389" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059402" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059390" version="1" comment="libsmbclient is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059391" version="1" comment="samba-32bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059403" version="1" comment="samba-64bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059392" version="1" comment="samba-client-32bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059404" version="1" comment="samba-client-64bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059405" version="1" comment="samba-client-x86 is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059393" version="1" comment="samba-client is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059394" version="1" comment="samba-krb-printing is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059406" version="1" comment="samba-python is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059395" version="1" comment="samba-vscan is &lt;0.3.6b-43.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059396" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059407" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059408" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059397" version="1" comment="samba-winbind is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059409" version="1" comment="samba-x86 is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059398" version="1" comment="samba is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059410" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009059411" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060136" version="1" comment="cpio is &lt;2.6-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060037" version="1" comment="tar is &lt;1.15.1-23.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061842" version="1" comment="MozillaFirefox-translations is &lt;3.5.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061843" version="1" comment="MozillaFirefox is &lt;3.5.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061844" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061845" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061846" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061847" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061848" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061849" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061850" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061851" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061852" version="1" comment="python-xpcom191 is &lt;1.9.1.11-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061297" version="1" comment="postgresql-contrib is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061294" version="1" comment="postgresql-devel is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061298" version="1" comment="postgresql-docs is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061295" version="1" comment="postgresql-libs-32bit is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061299" version="1" comment="postgresql-libs-64bit is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061300" version="1" comment="postgresql-libs-x86 is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061296" version="1" comment="postgresql-libs is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061301" version="1" comment="postgresql-pl is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061302" version="1" comment="postgresql-server is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061303" version="1" comment="postgresql is &lt;8.1.21-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060488" version="1" comment="te_ams is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060489" version="1" comment="te_cont is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060490" version="1" comment="te_dvilj is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030795"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060491" version="1" comment="te_eplai is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060492" version="1" comment="te_kpath is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060493" version="1" comment="te_latex is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030799"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060494" version="1" comment="te_mpost is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060495" version="1" comment="te_omega is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060496" version="1" comment="te_ptex is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060497" version="1" comment="te_web is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060498" version="1" comment="tetex is &lt;3.0-37.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062620" version="1" comment="iscsitarget is &lt;0.4.17-3.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060962" version="1" comment="cifs-mount is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060963" version="1" comment="ldapsmb is &lt;1.34b-25.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060975" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060976" version="1" comment="libmsrpc is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060964" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060977" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060965" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060978" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060966" version="1" comment="libsmbclient is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060967" version="1" comment="samba-32bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060979" version="1" comment="samba-64bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060968" version="1" comment="samba-client-32bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060980" version="1" comment="samba-client-64bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060981" version="1" comment="samba-client-x86 is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060969" version="1" comment="samba-client is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060970" version="1" comment="samba-krb-printing is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060982" version="1" comment="samba-python is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060971" version="1" comment="samba-vscan is &lt;0.3.6b-43.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060972" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060983" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060984" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060973" version="1" comment="samba-winbind is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060985" version="1" comment="samba-x86 is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060974" version="1" comment="samba is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060986" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060987" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104335" version="1" comment="cifs-mount is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104336" version="1" comment="libmsrpc-devel is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104337" version="1" comment="libmsrpc is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104338" version="1" comment="libsmbclient-32bit is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104339" version="1" comment="libsmbclient-devel is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104340" version="1" comment="libsmbclient is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104341" version="1" comment="samba-32bit is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104342" version="1" comment="samba-client-32bit is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104343" version="1" comment="samba-client is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104344" version="1" comment="samba-doc is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104345" version="1" comment="samba-krb-printing is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104346" version="1" comment="samba-python is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104347" version="1" comment="samba-vscan is &lt;0.3.6b-42.85.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104348" version="1" comment="samba-winbind-32bit is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104349" version="1" comment="samba-winbind is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104350" version="1" comment="samba is &lt;3.0.32-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060664" version="1" comment="ncpfs-devel is &lt;2.2.6-24.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060663" version="1" comment="ncpfs is &lt;2.2.6-24.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061989" version="1" comment="kernel-debug is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061984" version="1" comment="kernel-default is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061990" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061985" version="1" comment="kernel-smp is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061986" version="1" comment="kernel-source is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061987" version="1" comment="kernel-syms is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061988" version="1" comment="kernel-xen is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061991" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061992" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061993" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061995" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061996" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061997" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061994" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062690" version="1" comment="tomcat5-admin-webapps is &lt;5.5.27-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062691" version="1" comment="tomcat5-webapps is &lt;5.5.27-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062692" version="1" comment="tomcat5 is &lt;5.5.27-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061233" version="1" comment="xorg-x11-Xnest is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061234" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061235" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061236" version="1" comment="xorg-x11-devel-32bit is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061249" version="1" comment="xorg-x11-devel-64bit is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061237" version="1" comment="xorg-x11-devel is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061250" version="1" comment="xorg-x11-doc is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061238" version="1" comment="xorg-x11-fonts-100dpi is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061239" version="1" comment="xorg-x11-fonts-75dpi is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061240" version="1" comment="xorg-x11-fonts-cyrillic is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061241" version="1" comment="xorg-x11-fonts-scalable is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061242" version="1" comment="xorg-x11-fonts-syriac is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061243" version="1" comment="xorg-x11-libs-32bit is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061251" version="1" comment="xorg-x11-libs-64bit is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061252" version="1" comment="xorg-x11-libs-x86 is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061244" version="1" comment="xorg-x11-libs is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061245" version="1" comment="xorg-x11-man is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061253" version="1" comment="xorg-x11-sdk is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061246" version="1" comment="xorg-x11-server-glx is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061247" version="1" comment="xorg-x11-server is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061248" version="1" comment="xorg-x11 is &lt;6.9.0-50.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063288" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063289" version="1" comment="xorg-x11-server is &lt;6.9.0-50.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062015" version="1" comment="perl-32bit is &lt;5.8.8-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062017" version="1" comment="perl-64bit is &lt;5.8.8-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062018" version="1" comment="perl-x86 is &lt;5.8.8-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062016" version="1" comment="perl is &lt;5.8.8-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066489" version="1" comment="kernel-debug is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066484" version="1" comment="kernel-default is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066490" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066485" version="1" comment="kernel-smp is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066486" version="1" comment="kernel-source is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066487" version="1" comment="kernel-syms is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066488" version="1" comment="kernel-xen is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066491" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066493" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066494" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066495" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066492" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066496" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066497" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062300" version="1" comment="libpng-32bit is &lt;1.2.8-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062304" version="1" comment="libpng-64bit is &lt;1.2.8-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062301" version="1" comment="libpng-devel-32bit is &lt;1.2.8-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062305" version="1" comment="libpng-devel-64bit is &lt;1.2.8-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062302" version="1" comment="libpng-devel is &lt;1.2.8-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062306" version="1" comment="libpng-x86 is &lt;1.2.8-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062303" version="1" comment="libpng is &lt;1.2.8-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067766" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.8-1.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067767" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.8-1.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067768" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.8-1.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067769" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.8-1.7.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060762" version="1" comment="krb5-32bit is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060767" version="1" comment="krb5-64bit is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060768" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060769" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060763" version="1" comment="krb5-client is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060764" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060770" version="1" comment="krb5-devel-64bit is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060765" version="1" comment="krb5-devel is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060771" version="1" comment="krb5-server is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060772" version="1" comment="krb5-x86 is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060766" version="1" comment="krb5 is &lt;1.4.3-19.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066038" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.8-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066039" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.8-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066040" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.8-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066041" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.8-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104351" version="1" comment="krb5-32bit is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104352" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104353" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104354" version="1" comment="krb5-client is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104355" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104356" version="1" comment="krb5-devel is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104357" version="1" comment="krb5-server is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104358" version="1" comment="krb5 is &lt;1.4.3-19.43.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065137" version="1" comment="krb5-32bit is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065142" version="1" comment="krb5-64bit is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065143" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065144" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065138" version="1" comment="krb5-client is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065139" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065145" version="1" comment="krb5-devel-64bit is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065140" version="1" comment="krb5-devel is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065146" version="1" comment="krb5-server is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065147" version="1" comment="krb5-x86 is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065141" version="1" comment="krb5 is &lt;1.4.3-19.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060874" version="1" comment="libtiff-32bit is &lt;3.8.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060877" version="1" comment="libtiff-64bit is &lt;3.8.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060878" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060879" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060875" version="1" comment="libtiff-devel is &lt;3.8.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060880" version="1" comment="libtiff-x86 is &lt;3.8.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009060876" version="1" comment="libtiff is &lt;3.8.2-5.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104359" version="1" comment="apache2-devel is &lt;2.2.3-16.25.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104360" version="1" comment="apache2-doc is &lt;2.2.3-16.25.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104361" version="1" comment="apache2-example-pages is &lt;2.2.3-16.25.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104362" version="1" comment="apache2-prefork is &lt;2.2.3-16.25.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104363" version="1" comment="apache2-worker is &lt;2.2.3-16.25.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104364" version="1" comment="apache2 is &lt;2.2.3-16.25.40" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070444" version="1" comment="apache2-devel is &lt;2.2.3-16.32.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070445" version="1" comment="apache2-doc is &lt;2.2.3-16.32.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070446" version="1" comment="apache2-example-pages is &lt;2.2.3-16.32.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070447" version="1" comment="apache2-prefork is &lt;2.2.3-16.32.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070448" version="1" comment="apache2-worker is &lt;2.2.3-16.32.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070449" version="1" comment="apache2 is &lt;2.2.3-16.32.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070438" version="1" comment="apache2-devel is &lt;2.2.3-16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070439" version="1" comment="apache2-doc is &lt;2.2.3-16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070440" version="1" comment="apache2-example-pages is &lt;2.2.3-16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070441" version="1" comment="apache2-prefork is &lt;2.2.3-16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070442" version="1" comment="apache2-worker is &lt;2.2.3-16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070443" version="1" comment="apache2 is &lt;2.2.3-16.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066973" version="1" comment="wireshark-devel is &lt;1.4.4-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066972" version="1" comment="wireshark is &lt;1.4.4-0.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063152" version="1" comment="libgdiplus is &lt;1.2.2-13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067084" version="1" comment="MozillaFirefox is &lt;3.6.16-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067085" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.16-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067086" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.16-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066217" version="1" comment="MozillaFirefox-translations is &lt;3.6.15-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066218" version="1" comment="MozillaFirefox is &lt;3.6.15-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066219" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066220" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066221" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066222" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066223" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066224" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066225" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.15-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066124" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066125" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066126" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066127" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066128" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066129" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066130" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066131" version="1" comment="python-xpcom191 is &lt;1.9.1.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104365" version="1" comment="apache2-devel is &lt;2.2.3-16.32.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104366" version="1" comment="apache2-doc is &lt;2.2.3-16.32.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104367" version="1" comment="apache2-example-pages is &lt;2.2.3-16.32.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104368" version="1" comment="apache2-prefork is &lt;2.2.3-16.32.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104369" version="1" comment="apache2-worker is &lt;2.2.3-16.32.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104370" version="1" comment="apache2 is &lt;2.2.3-16.32.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044224"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069411" version="1" comment="libapr-util1-64bit is &lt;1.2.2-13.12.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069412" version="1" comment="libapr-util1-devel-64bit is &lt;1.2.2-13.12.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069413" version="1" comment="libapr-util1-devel is &lt;1.2.2-13.12.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069414" version="1" comment="libapr-util1 is &lt;1.2.2-13.12.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033229"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069415" version="1" comment="libapr1-64bit is &lt;1.2.2-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069416" version="1" comment="libapr1-devel-64bit is &lt;1.2.2-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069417" version="1" comment="libapr1-devel is &lt;1.2.2-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069418" version="1" comment="libapr1 is &lt;1.2.2-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009037238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071816" version="1" comment="finch-devel is &lt;2.6.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071813" version="1" comment="finch is &lt;2.6.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071817" version="1" comment="libpurple-devel is &lt;2.6.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071814" version="1" comment="libpurple is &lt;2.6.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071818" version="1" comment="pidgin-devel is &lt;2.6.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071815" version="1" comment="pidgin is &lt;2.6.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063564" version="1" comment="mysql-Max is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063559" version="1" comment="mysql-client is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063560" version="1" comment="mysql-devel is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063561" version="1" comment="mysql-shared-32bit is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063565" version="1" comment="mysql-shared-64bit is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063566" version="1" comment="mysql-shared-x86 is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063562" version="1" comment="mysql-shared is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063563" version="1" comment="mysql is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063567" version="1" comment="mysql-bench is &lt;5.0.26-12.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061757" version="1" comment="clamav is &lt;0.96.1-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067087" version="1" comment="quagga-devel is &lt;0.99.9-14.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067088" version="1" comment="quagga is &lt;0.99.9-14.9.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104371" version="1" comment="quagga-devel is &lt;0.99.9-14.7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104372" version="1" comment="quagga is &lt;0.99.9-14.7.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044225"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066709" version="1" comment="quagga-devel is &lt;0.99.9-14.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066710" version="1" comment="quagga is &lt;0.99.9-14.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062154" version="1" comment="freetype2-32bit is &lt;2.1.10-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062158" version="1" comment="freetype2-64bit is &lt;2.1.10-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062155" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062159" version="1" comment="freetype2-devel-64bit is &lt;2.1.10-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062156" version="1" comment="freetype2-devel is &lt;2.1.10-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062160" version="1" comment="freetype2-x86 is &lt;2.1.10-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062157" version="1" comment="freetype2 is &lt;2.1.10-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104373" version="1" comment="freetype2-32bit is &lt;2.1.10-18.22.21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104374" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.22.21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104375" version="1" comment="freetype2-devel is &lt;2.1.10-18.22.21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104376" version="1" comment="freetype2 is &lt;2.1.10-18.22.21.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104377" version="1" comment="ft2demos is &lt;2.1.10-19.18.21.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044227"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062713" version="1" comment="popt-32bit is &lt;1.7-271.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062720" version="1" comment="popt-64bit is &lt;1.7-271.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062714" version="1" comment="popt-devel-32bit is &lt;1.7-271.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062721" version="1" comment="popt-devel-64bit is &lt;1.7-271.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062715" version="1" comment="popt-devel is &lt;1.7-271.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062722" version="1" comment="popt-x86 is &lt;1.7-271.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062716" version="1" comment="popt is &lt;1.7-271.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062717" version="1" comment="rpm-devel is &lt;4.4.2-43.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062718" version="1" comment="rpm-python is &lt;4.4.2-43.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062719" version="1" comment="rpm is &lt;4.4.2-43.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061696" version="1" comment="w3m-inline-image is &lt;0.5.1-19.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061695" version="1" comment="w3m is &lt;0.5.1-19.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065148" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065155" version="1" comment="kernel-debug is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065149" version="1" comment="kernel-default is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065156" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065157" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065150" version="1" comment="kernel-smp is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065151" version="1" comment="kernel-source is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065152" version="1" comment="kernel-syms is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065158" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065159" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065153" version="1" comment="kernel-xen is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065154" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065160" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065161" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.74.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062208" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062215" version="1" comment="kernel-debug is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062209" version="1" comment="kernel-default is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062216" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062217" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062210" version="1" comment="kernel-smp is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062211" version="1" comment="kernel-source is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062212" version="1" comment="kernel-syms is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062218" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062219" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062213" version="1" comment="kernel-xen is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062214" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062220" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062221" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062739" version="1" comment="libvirt-devel is &lt;0.3.3-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062737" version="1" comment="libvirt-python is &lt;0.3.3-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009062738" version="1" comment="libvirt is &lt;0.3.3-18.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104378" version="1" comment="kernel-default is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104379" version="1" comment="kernel-source is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104380" version="1" comment="kernel-syms is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104381" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104382" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104383" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104384" version="1" comment="kernel-smp is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104385" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104386" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104387" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104388" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009061960" version="1" comment="gpg2 is &lt;1.9.18-17.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070745" version="1" comment="evince is &lt;0.4.0-25.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064188" version="1" comment="MozillaFirefox-translations is &lt;3.5.15-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064189" version="1" comment="MozillaFirefox is &lt;3.5.15-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064190" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064191" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064192" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064193" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064194" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064195" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064196" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.5.15-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064197" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064198" version="1" comment="python-xpcom191 is &lt;1.9.1.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065606" version="1" comment="perl-32bit is &lt;5.8.8-14.17.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065608" version="1" comment="perl-64bit is &lt;5.8.8-14.17.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065609" version="1" comment="perl-x86 is &lt;5.8.8-14.17.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065607" version="1" comment="perl is &lt;5.8.8-14.17.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074797" version="1" comment="socat is &lt;1.7.0.0-1.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065587" version="1" comment="libsmi-devel is &lt;0.4.3-17.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065588" version="1" comment="libsmi is &lt;0.4.3-17.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063585" version="1" comment="OpenOffice_org-cs is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063587" version="1" comment="OpenOffice_org-de is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063590" version="1" comment="OpenOffice_org-es is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063592" version="1" comment="OpenOffice_org-fr is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063593" version="1" comment="OpenOffice_org-galleries is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063594" version="1" comment="OpenOffice_org-gnome is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063597" version="1" comment="OpenOffice_org-hu is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063598" version="1" comment="OpenOffice_org-it is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063599" version="1" comment="OpenOffice_org-ja is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063600" version="1" comment="OpenOffice_org-kde is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063602" version="1" comment="OpenOffice_org-mono is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063607" version="1" comment="OpenOffice_org-pl is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063608" version="1" comment="OpenOffice_org-pt-BR is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063610" version="1" comment="OpenOffice_org-sk is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063613" version="1" comment="OpenOffice_org-zh-CN is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063614" version="1" comment="OpenOffice_org-zh-TW is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063616" version="1" comment="OpenOffice_org is &lt;3.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038626"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070746" version="1" comment="boost-32bit is &lt;1.33.1-17.13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070747" version="1" comment="boost is &lt;1.33.1-17.13.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070751" version="1" comment="libreoffice-cs is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070753" version="1" comment="libreoffice-de-templates is &lt;8.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070754" version="1" comment="libreoffice-de is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070757" version="1" comment="libreoffice-es is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070759" version="1" comment="libreoffice-fr is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070760" version="1" comment="libreoffice-galleries is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070761" version="1" comment="libreoffice-gnome is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070764" version="1" comment="libreoffice-hu is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070765" version="1" comment="libreoffice-it is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070766" version="1" comment="libreoffice-ja is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070767" version="1" comment="libreoffice-kde is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070769" version="1" comment="libreoffice-mono is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070773" version="1" comment="libreoffice-pl is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070774" version="1" comment="libreoffice-pt-BR is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070776" version="1" comment="libreoffice-sk is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070779" version="1" comment="libreoffice-zh-CN is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070780" version="1" comment="libreoffice-zh-TW is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070782" version="1" comment="libreoffice is &lt;3.3.1.2-1.6.2.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070784" version="1" comment="myspell-american is &lt;20040623-33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070785" version="1" comment="myspell-brazilian is &lt;20020806-33.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070786" version="1" comment="myspell-british is &lt;20050526-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070787" version="1" comment="myspell-catalan is &lt;0.1-248.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070788" version="1" comment="myspell-czech is &lt;20030907-59.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070789" version="1" comment="myspell-danish is &lt;20050421-27.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070790" version="1" comment="myspell-dutch is &lt;20050719-22.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070791" version="1" comment="myspell-french is &lt;1.0.1.1-26.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070792" version="1" comment="myspell-german is &lt;20051213-19.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070793" version="1" comment="myspell-greek is &lt;20041220-26.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070794" version="1" comment="myspell-gujarati is &lt;20060929-20.12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070795" version="1" comment="myspell-hindi is &lt;0.1-20.12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070796" version="1" comment="myspell-italian is &lt;20050711-22.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070797" version="1" comment="myspell-lithuanian is &lt;20031231-26.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070798" version="1" comment="myspell-marathi is &lt;0.1-20.12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070799" version="1" comment="myspell-norsk-bokmaal is &lt;20050308-22.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070801" version="1" comment="myspell-polish is &lt;20051016-20.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070802" version="1" comment="myspell-portuguese is &lt;20020629-243.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070803" version="1" comment="myspell-russian is &lt;20040406-28.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070804" version="1" comment="myspell-slovak is &lt;20050901-20.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070805" version="1" comment="myspell-slovene is &lt;20030907-54.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070806" version="1" comment="myspell-spanish is &lt;20051029-20.14.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070807" version="1" comment="myspell-swedish is &lt;20061207-1.12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070808" version="1" comment="myspell-xhosa is &lt;20060123-20.12.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064515" version="1" comment="quagga-devel is &lt;0.99.9-14.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064516" version="1" comment="quagga is &lt;0.99.9-14.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063020" version="1" comment="kernel-default is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063021" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063022" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063023" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063024" version="1" comment="kernel-source is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063025" version="1" comment="kernel-syms is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063026" version="1" comment="kernel-debug is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063031" version="1" comment="cloop-kmp-default is &lt;2.01_2.6.16.60_0.69.1-22.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063032" version="1" comment="cpint-kmp-default is &lt;2.5.3_2.6.16.60_0.69.1-3.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063033" version="1" comment="drbd-kmp-default is &lt;0.7.22_2.6.16.60_0.69.1-42.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063034" version="1" comment="lirc-kmp-default is &lt;0.8.0_2.6.16.60_0.69.1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063035" version="1" comment="kernel-smp is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063036" version="1" comment="kernel-xen is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063037" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063039" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063040" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063041" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063038" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063379" version="1" comment="freetype2-32bit is &lt;2.1.10-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063383" version="1" comment="freetype2-64bit is &lt;2.1.10-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063380" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063384" version="1" comment="freetype2-devel-64bit is &lt;2.1.10-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063381" version="1" comment="freetype2-devel is &lt;2.1.10-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063385" version="1" comment="freetype2-x86 is &lt;2.1.10-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063382" version="1" comment="freetype2 is &lt;2.1.10-18.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063158" version="1" comment="cifs-mount is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063159" version="1" comment="ldapsmb is &lt;1.34b-25.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063171" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063172" version="1" comment="libmsrpc is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063160" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063173" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063161" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063174" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063162" version="1" comment="libsmbclient is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063163" version="1" comment="samba-32bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063175" version="1" comment="samba-64bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063164" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063176" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063177" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063165" version="1" comment="samba-client is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063166" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063178" version="1" comment="samba-python is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063167" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063168" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063179" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063180" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063169" version="1" comment="samba-winbind is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063181" version="1" comment="samba-x86 is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063170" version="1" comment="samba is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063182" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063183" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068072" version="1" comment="mailman is &lt;2.1.7-15.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039481"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064199" version="1" comment="mozilla-nspr-32bit is &lt;4.8.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064206" version="1" comment="mozilla-nspr-64bit is &lt;4.8.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064200" version="1" comment="mozilla-nspr-devel is &lt;4.8.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064207" version="1" comment="mozilla-nspr-x86 is &lt;4.8.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064201" version="1" comment="mozilla-nspr is &lt;4.8.6-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064202" version="1" comment="mozilla-nss-32bit is &lt;3.12.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064208" version="1" comment="mozilla-nss-64bit is &lt;3.12.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064203" version="1" comment="mozilla-nss-devel is &lt;3.12.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064209" version="1" comment="mozilla-nss-x86 is &lt;3.12.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064205" version="1" comment="mozilla-nss is &lt;3.12.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064204" version="1" comment="mozilla-nss-tools is &lt;3.12.8-1.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071652" version="1" comment="pam-32bit is &lt;0.99.6.3-28.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071655" version="1" comment="pam-64bit is &lt;0.99.6.3-28.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071656" version="1" comment="pam-devel-32bit is &lt;0.99.6.3-28.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071657" version="1" comment="pam-devel-64bit is &lt;0.99.6.3-28.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071653" version="1" comment="pam-devel is &lt;0.99.6.3-28.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071658" version="1" comment="pam-x86 is &lt;0.99.6.3-28.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071654" version="1" comment="pam is &lt;0.99.6.3-28.25.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071659" version="1" comment="pam-32bit is &lt;0.99.6.3-28.20.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071660" version="1" comment="pam-64bit is &lt;0.99.6.3-28.20.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071661" version="1" comment="pam-devel-32bit is &lt;0.99.6.3-28.20.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071662" version="1" comment="pam-devel-64bit is &lt;0.99.6.3-28.20.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032628"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071663" version="1" comment="pam-devel is &lt;0.99.6.3-28.20.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071664" version="1" comment="pam-x86 is &lt;0.99.6.3-28.20.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071665" version="1" comment="pam is &lt;0.99.6.3-28.20.3.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073285" version="1" comment="mono-core-32bit is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073299" version="1" comment="mono-core-x86 is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073286" version="1" comment="mono-core is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073287" version="1" comment="mono-data-firebird is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073288" version="1" comment="mono-data-oracle is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073289" version="1" comment="mono-data-postgresql is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073290" version="1" comment="mono-data-sqlite is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073291" version="1" comment="mono-data-sybase is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073292" version="1" comment="mono-data is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073295" version="1" comment="mono-locale-extras is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073296" version="1" comment="mono-nunit is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073297" version="1" comment="mono-web is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073298" version="1" comment="mono-winforms is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073283" version="1" comment="bytefx-data-mysql is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073284" version="1" comment="ibm-data-db2 is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073293" version="1" comment="mono-devel is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073294" version="1" comment="mono-extras is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073300" version="1" comment="mono-jscript is &lt;1.2.2-12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063807" version="1" comment="postgresql-contrib is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063804" version="1" comment="postgresql-devel is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063808" version="1" comment="postgresql-docs is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063805" version="1" comment="postgresql-libs-32bit is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063809" version="1" comment="postgresql-libs-64bit is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063810" version="1" comment="postgresql-libs-x86 is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063806" version="1" comment="postgresql-libs is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063811" version="1" comment="postgresql-pl is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063812" version="1" comment="postgresql-server is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009063813" version="1" comment="postgresql is &lt;8.1.22-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064568" version="1" comment="clamav is &lt;0.96.4-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065224" version="1" comment="zope3 is &lt;3.1.0-18.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065225" version="1" comment="zope is &lt;2.7.8-15.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066377" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066388" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066378" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066379" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066381" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066382" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066383" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066384" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066385" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066387" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr12.3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064548" version="1" comment="openslp-32bit is &lt;1.2.0-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064551" version="1" comment="openslp-64bit is &lt;1.2.0-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064549" version="1" comment="openslp-devel is &lt;1.2.0-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064552" version="1" comment="openslp-server is &lt;1.2.0-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064553" version="1" comment="openslp-x86 is &lt;1.2.0-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064550" version="1" comment="openslp is &lt;1.2.0-22.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065639" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065646" version="1" comment="kernel-debug is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065640" version="1" comment="kernel-default is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065647" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065648" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065641" version="1" comment="kernel-smp is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065642" version="1" comment="kernel-source is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065643" version="1" comment="kernel-syms is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065649" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065650" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065644" version="1" comment="kernel-xen is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065645" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070814" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070815" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.76.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065317" version="1" comment="xpdf-tools is &lt;3.01-21.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065318" version="1" comment="xpdf is &lt;3.01-21.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064504" version="1" comment="poppler-glib is &lt;0.4.4-19.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064505" version="1" comment="poppler-qt is &lt;0.4.4-19.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064506" version="1" comment="poppler is &lt;0.4.4-19.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064503" version="1" comment="poppler-devel is &lt;0.4.4-19.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064725" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064726" version="1" comment="php5-bcmath is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064727" version="1" comment="php5-bz2 is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064728" version="1" comment="php5-calendar is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064729" version="1" comment="php5-ctype is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064730" version="1" comment="php5-curl is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064731" version="1" comment="php5-dba is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064732" version="1" comment="php5-dbase is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064733" version="1" comment="php5-devel is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064734" version="1" comment="php5-dom is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064735" version="1" comment="php5-exif is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064736" version="1" comment="php5-fastcgi is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064737" version="1" comment="php5-ftp is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064738" version="1" comment="php5-gd is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064739" version="1" comment="php5-gettext is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064740" version="1" comment="php5-gmp is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064741" version="1" comment="php5-hash is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064742" version="1" comment="php5-iconv is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064743" version="1" comment="php5-imap is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064744" version="1" comment="php5-json is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064745" version="1" comment="php5-ldap is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064746" version="1" comment="php5-mbstring is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064747" version="1" comment="php5-mcrypt is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064748" version="1" comment="php5-mhash is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064749" version="1" comment="php5-mysql is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064750" version="1" comment="php5-ncurses is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064751" version="1" comment="php5-odbc is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064752" version="1" comment="php5-openssl is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064753" version="1" comment="php5-pcntl is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064754" version="1" comment="php5-pdo is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064755" version="1" comment="php5-pear is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064756" version="1" comment="php5-pgsql is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064757" version="1" comment="php5-posix is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064758" version="1" comment="php5-pspell is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064759" version="1" comment="php5-shmop is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064760" version="1" comment="php5-snmp is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064761" version="1" comment="php5-soap is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064762" version="1" comment="php5-sockets is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064763" version="1" comment="php5-sqlite is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064764" version="1" comment="php5-suhosin is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064765" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064766" version="1" comment="php5-sysvsem is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064767" version="1" comment="php5-sysvshm is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064768" version="1" comment="php5-tokenizer is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064769" version="1" comment="php5-wddx is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064770" version="1" comment="php5-xmlreader is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064771" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064772" version="1" comment="php5-xsl is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064773" version="1" comment="php5-zlib is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064774" version="1" comment="php5-tidy is &lt;5.2.14-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065949" version="1" comment="tomcat5-admin-webapps is &lt;5.5.27-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065950" version="1" comment="tomcat5-webapps is &lt;5.5.27-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065951" version="1" comment="tomcat5 is &lt;5.5.27-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067752" version="1" comment="freetype2-32bit is &lt;2.1.10-18.25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067756" version="1" comment="freetype2-64bit is &lt;2.1.10-18.25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067753" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067757" version="1" comment="freetype2-devel-64bit is &lt;2.1.10-18.25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067754" version="1" comment="freetype2-devel is &lt;2.1.10-18.25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067758" version="1" comment="freetype2-x86 is &lt;2.1.10-18.25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067755" version="1" comment="freetype2 is &lt;2.1.10-18.25.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072709" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072716" version="1" comment="kernel-debug is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072710" version="1" comment="kernel-default is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072717" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072718" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072711" version="1" comment="kernel-smp is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072712" version="1" comment="kernel-source is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072713" version="1" comment="kernel-syms is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072719" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072720" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072714" version="1" comment="kernel-xen is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072715" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072721" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072722" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072723" version="1" comment="kernel-default is &lt;2.6.16.60-0.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072724" version="1" comment="kernel-source is &lt;2.6.16.60-0.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072725" version="1" comment="kernel-syms is &lt;2.6.16.60-0.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066714" version="1" comment="util-linux is &lt;2.12r-35.41.43.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066711" version="1" comment="fuse-devel is &lt;2.7.2-15.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066712" version="1" comment="fuse is &lt;2.7.2-15.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066713" version="1" comment="libfuse2 is &lt;2.7.2-15.10.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067089" version="1" comment="fuse-devel is &lt;2.7.2-15.10.11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067090" version="1" comment="fuse is &lt;2.7.2-15.10.11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067091" version="1" comment="libfuse2 is &lt;2.7.2-15.10.11.10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039228"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065453" version="1" comment="supportutils is &lt;1.20-0.7.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064589" version="1" comment="libxml2-32bit is &lt;2.6.23-15.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064593" version="1" comment="libxml2-64bit is &lt;2.6.23-15.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064590" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064594" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064591" version="1" comment="libxml2-devel is &lt;2.6.23-15.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064595" version="1" comment="libxml2-x86 is &lt;2.6.23-15.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009064592" version="1" comment="libxml2 is &lt;2.6.23-15.23.13" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066646" version="1" comment="postgresql-contrib is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066643" version="1" comment="postgresql-devel is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066647" version="1" comment="postgresql-docs is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066644" version="1" comment="postgresql-libs-32bit is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066648" version="1" comment="postgresql-libs-64bit is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066649" version="1" comment="postgresql-libs-x86 is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066645" version="1" comment="postgresql-libs is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066650" version="1" comment="postgresql-pl is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066651" version="1" comment="postgresql-server is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066652" version="1" comment="postgresql is &lt;8.1.22-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067095" version="1" comment="postgresql-contrib is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067092" version="1" comment="postgresql-devel is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067096" version="1" comment="postgresql-docs is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067093" version="1" comment="postgresql-libs-32bit is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067097" version="1" comment="postgresql-libs-64bit is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067098" version="1" comment="postgresql-libs-x86 is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067094" version="1" comment="postgresql-libs is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067099" version="1" comment="postgresql-pl is &lt;8.1.22-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067100" version="1" comment="postgresql-server is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067101" version="1" comment="postgresql is &lt;8.1.22-0.6.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067102" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067103" version="1" comment="php5-bcmath is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067104" version="1" comment="php5-bz2 is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067105" version="1" comment="php5-calendar is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067106" version="1" comment="php5-ctype is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067107" version="1" comment="php5-curl is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067108" version="1" comment="php5-dba is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067109" version="1" comment="php5-dbase is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067110" version="1" comment="php5-devel is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067111" version="1" comment="php5-dom is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067112" version="1" comment="php5-exif is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067113" version="1" comment="php5-fastcgi is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067114" version="1" comment="php5-ftp is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067115" version="1" comment="php5-gd is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067116" version="1" comment="php5-gettext is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067117" version="1" comment="php5-gmp is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067118" version="1" comment="php5-hash is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067119" version="1" comment="php5-iconv is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067120" version="1" comment="php5-imap is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067121" version="1" comment="php5-json is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067122" version="1" comment="php5-ldap is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067123" version="1" comment="php5-mbstring is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067124" version="1" comment="php5-mcrypt is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067125" version="1" comment="php5-mhash is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067126" version="1" comment="php5-mysql is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067127" version="1" comment="php5-ncurses is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067128" version="1" comment="php5-odbc is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067129" version="1" comment="php5-openssl is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067130" version="1" comment="php5-pcntl is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067131" version="1" comment="php5-pdo is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067132" version="1" comment="php5-pear is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067133" version="1" comment="php5-pgsql is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067134" version="1" comment="php5-posix is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067135" version="1" comment="php5-pspell is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067136" version="1" comment="php5-shmop is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067137" version="1" comment="php5-snmp is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067138" version="1" comment="php5-soap is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067139" version="1" comment="php5-sockets is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067140" version="1" comment="php5-sqlite is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067141" version="1" comment="php5-suhosin is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067142" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067143" version="1" comment="php5-sysvsem is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067144" version="1" comment="php5-sysvshm is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067145" version="1" comment="php5-tokenizer is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067146" version="1" comment="php5-wddx is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067147" version="1" comment="php5-xmlreader is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067148" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067149" version="1" comment="php5-xsl is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067150" version="1" comment="php5-zlib is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067151" version="1" comment="php5-tidy is &lt;5.2.14-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066864" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066865" version="1" comment="php5-bcmath is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066866" version="1" comment="php5-bz2 is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066867" version="1" comment="php5-calendar is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066868" version="1" comment="php5-ctype is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066869" version="1" comment="php5-curl is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066870" version="1" comment="php5-dba is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066871" version="1" comment="php5-dbase is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066872" version="1" comment="php5-devel is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066873" version="1" comment="php5-dom is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066874" version="1" comment="php5-exif is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066875" version="1" comment="php5-fastcgi is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066876" version="1" comment="php5-ftp is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066877" version="1" comment="php5-gd is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066878" version="1" comment="php5-gettext is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066879" version="1" comment="php5-gmp is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066880" version="1" comment="php5-hash is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066881" version="1" comment="php5-iconv is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066882" version="1" comment="php5-imap is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066883" version="1" comment="php5-json is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066884" version="1" comment="php5-ldap is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066885" version="1" comment="php5-mbstring is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066886" version="1" comment="php5-mcrypt is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066887" version="1" comment="php5-mhash is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066888" version="1" comment="php5-mysql is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066889" version="1" comment="php5-ncurses is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066890" version="1" comment="php5-odbc is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066891" version="1" comment="php5-openssl is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066892" version="1" comment="php5-pcntl is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066893" version="1" comment="php5-pdo is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066894" version="1" comment="php5-pear is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066895" version="1" comment="php5-pgsql is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066896" version="1" comment="php5-posix is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066897" version="1" comment="php5-pspell is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066898" version="1" comment="php5-shmop is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066899" version="1" comment="php5-snmp is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066900" version="1" comment="php5-soap is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066901" version="1" comment="php5-sockets is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066902" version="1" comment="php5-sqlite is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066903" version="1" comment="php5-suhosin is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066904" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066905" version="1" comment="php5-sysvsem is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066906" version="1" comment="php5-sysvshm is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066907" version="1" comment="php5-tokenizer is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066908" version="1" comment="php5-wddx is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066909" version="1" comment="php5-xmlreader is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066910" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066911" version="1" comment="php5-xsl is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066912" version="1" comment="php5-zlib is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066913" version="1" comment="php5-tidy is &lt;5.2.14-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067826" version="1" comment="mono-core-32bit is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067840" version="1" comment="mono-core-x86 is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067827" version="1" comment="mono-core is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067828" version="1" comment="mono-data-firebird is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067829" version="1" comment="mono-data-oracle is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067830" version="1" comment="mono-data-postgresql is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067831" version="1" comment="mono-data-sqlite is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067832" version="1" comment="mono-data-sybase is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067833" version="1" comment="mono-data is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067836" version="1" comment="mono-locale-extras is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067837" version="1" comment="mono-nunit is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067838" version="1" comment="mono-web is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067839" version="1" comment="mono-winforms is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067824" version="1" comment="bytefx-data-mysql is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067825" version="1" comment="ibm-data-db2 is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067834" version="1" comment="mono-devel is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067835" version="1" comment="mono-extras is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067841" version="1" comment="mono-jscript is &lt;1.2.2-12.30.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068079" version="1" comment="mono-core-32bit is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068093" version="1" comment="mono-core-x86 is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068080" version="1" comment="mono-core is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068081" version="1" comment="mono-data-firebird is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068082" version="1" comment="mono-data-oracle is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068083" version="1" comment="mono-data-postgresql is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068084" version="1" comment="mono-data-sqlite is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068085" version="1" comment="mono-data-sybase is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031774"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068086" version="1" comment="mono-data is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068089" version="1" comment="mono-locale-extras is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068090" version="1" comment="mono-nunit is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068091" version="1" comment="mono-web is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068092" version="1" comment="mono-winforms is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068077" version="1" comment="bytefx-data-mysql is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068078" version="1" comment="ibm-data-db2 is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068087" version="1" comment="mono-devel is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030855"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068088" version="1" comment="mono-extras is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068094" version="1" comment="mono-jscript is &lt;1.2.2-12.30.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039482"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068095" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068096" version="1" comment="openssl-64bit is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068097" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068098" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068099" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068100" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068101" version="1" comment="openssl-x86 is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068102" version="1" comment="openssl is &lt;0.9.8a-18.45.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039483"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068103" version="1" comment="openssl-32bit is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068107" version="1" comment="openssl-64bit is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068104" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068108" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068105" version="1" comment="openssl-devel is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068109" version="1" comment="openssl-doc is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068110" version="1" comment="openssl-x86 is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068106" version="1" comment="openssl is &lt;0.9.8a-18.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066654" version="1" comment="build is &lt;2007.05.10-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069159" version="1" comment="virt-manager is &lt;0.5.3-0.33.32.14" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039673"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069160" version="1" comment="xen-devel is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069161" version="1" comment="xen-doc-html is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069162" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069163" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069164" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069173" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069165" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069174" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069175" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069166" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069176" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069177" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069167" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069168" version="1" comment="xen-libs is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069169" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069170" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069171" version="1" comment="xen-tools is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069172" version="1" comment="xen is &lt;3.2.3_17040_24-0.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039674"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065079" version="1" comment="clamav is &lt;0.96.5-0.4.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107275" version="1" comment="libicu-32bit is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107273" version="1" comment="libicu-32bit is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107276" version="1" comment="libicu-64bit is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107277" version="1" comment="libicu-devel-32bit is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107278" version="1" comment="libicu-devel-32bit is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107279" version="1" comment="libicu-devel-64bit is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107280" version="1" comment="libicu-devel is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107281" version="1" comment="libicu-devel is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030778"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107282" version="1" comment="libicu-doc is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107283" version="1" comment="libicu-doc is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107284" version="1" comment="libicu-x86 is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107285" version="1" comment="libicu is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107274" version="1" comment="libicu is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107286" version="1" comment="icu-data is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107287" version="1" comment="icu-data is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107288" version="1" comment="icu is &lt;3.4-16.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107272" version="1" comment="icu is &lt;3.4-16.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030777"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066409" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066410" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066411" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066404" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066412" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066413" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066405" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066406" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066414" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066407" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066408" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.1-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068468" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068469" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068470" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068471" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067770" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067781" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067771" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067772" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067774" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067775" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067776" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067777" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067778" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067780" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr12.4-0.7.18" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066655" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066666" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066656" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066657" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066659" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066660" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066661" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066662" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066663" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066665" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr12.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067782" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067783" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067784" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067785" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067786" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067787" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067788" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067789" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067790" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067791" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067792" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.1-1.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065699" version="1" comment="pcsc-lite-devel is &lt;1.2.9_beta9-17.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065700" version="1" comment="pcsc-lite is &lt;1.2.9_beta9-17.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065891" version="1" comment="cvs2svn is &lt;1.3.0-30.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065889" version="1" comment="subversion-devel is &lt;1.3.1-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065892" version="1" comment="subversion-python is &lt;1.3.1-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065893" version="1" comment="subversion-server is &lt;1.3.1-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065894" version="1" comment="subversion-tools is &lt;1.3.1-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065890" version="1" comment="subversion is &lt;1.3.1-1.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009065895" version="1" comment="viewcvs is &lt;1.0.5-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009038985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066550" version="1" comment="gimp-devel is &lt;2.2.10-22.35.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066551" version="1" comment="gimp is &lt;2.2.10-22.35.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075851" version="1" comment="kernel-default is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075866" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075867" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075868" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075853" version="1" comment="kernel-source is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075854" version="1" comment="kernel-syms is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075869" version="1" comment="kernel-debug is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075850" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075870" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075852" version="1" comment="kernel-smp is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075871" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075872" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075855" version="1" comment="kernel-xen is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075856" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068148" version="1" comment="libtiff-32bit is &lt;3.8.2-5.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068149" version="1" comment="libtiff-64bit is &lt;3.8.2-5.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068150" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068151" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068152" version="1" comment="libtiff-devel is &lt;3.8.2-5.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068153" version="1" comment="libtiff-x86 is &lt;3.8.2-5.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068154" version="1" comment="libtiff is &lt;3.8.2-5.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073080" version="1" comment="xorg-x11-Xnest is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073081" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073082" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073083" version="1" comment="xorg-x11-devel-32bit is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073096" version="1" comment="xorg-x11-devel-64bit is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073084" version="1" comment="xorg-x11-devel is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073097" version="1" comment="xorg-x11-doc is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073085" version="1" comment="xorg-x11-fonts-100dpi is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073086" version="1" comment="xorg-x11-fonts-75dpi is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073087" version="1" comment="xorg-x11-fonts-cyrillic is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073088" version="1" comment="xorg-x11-fonts-scalable is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073089" version="1" comment="xorg-x11-fonts-syriac is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073090" version="1" comment="xorg-x11-libs-32bit is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073098" version="1" comment="xorg-x11-libs-64bit is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073099" version="1" comment="xorg-x11-libs-x86 is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073091" version="1" comment="xorg-x11-libs is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073092" version="1" comment="xorg-x11-man is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073100" version="1" comment="xorg-x11-sdk is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073093" version="1" comment="xorg-x11-server-glx is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073094" version="1" comment="xorg-x11-server is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073095" version="1" comment="xorg-x11 is &lt;6.9.0-50.78.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040365"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068519" version="1" comment="firefox3-pango-32bit is &lt;1.14.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068520" version="1" comment="firefox3-pango is &lt;1.14.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068521" version="1" comment="firefox3-pango-devel is &lt;1.14.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033289"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068522" version="1" comment="firefox3-pango-doc is &lt;1.14.5-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068267" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068268" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068269" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068270" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068271" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068272" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068273" version="1" comment="mozilla-xulrunner191-devel is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068274" version="1" comment="python-xpcom191 is &lt;1.9.1.19-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068275" version="1" comment="MozillaFirefox-translations is &lt;3.6.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068276" version="1" comment="MozillaFirefox is &lt;3.6.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068277" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.17-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068278" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.17-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068279" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.17-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068280" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.17-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068281" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.17-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068282" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.17-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068283" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069301" version="1" comment="MozillaFirefox-translations is &lt;3.6.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069302" version="1" comment="MozillaFirefox is &lt;3.6.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069303" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.18-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069304" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.18-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069305" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.18-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069306" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.18-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069307" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.18-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069308" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.18-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069309" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.18-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070101" version="1" comment="MozillaFirefox-translations is &lt;3.6.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070102" version="1" comment="MozillaFirefox is &lt;3.6.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070103" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070104" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070105" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070106" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070107" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070108" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.20-1.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070109" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.20-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068636" version="1" comment="ruby-devel is &lt;1.8.6.p369-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068637" version="1" comment="ruby-doc-html is &lt;1.8.6.p369-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068638" version="1" comment="ruby-doc-ri is &lt;1.8.6.p369-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068639" version="1" comment="ruby-examples is &lt;1.8.6.p369-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068640" version="1" comment="ruby-test-suite is &lt;1.8.6.p369-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068641" version="1" comment="ruby-tk is &lt;1.8.6.p369-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068635" version="1" comment="ruby is &lt;1.8.6.p369-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066571" version="1" comment="libtiff-32bit is &lt;3.8.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066574" version="1" comment="libtiff-64bit is &lt;3.8.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066575" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066576" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066572" version="1" comment="libtiff-devel is &lt;3.8.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066577" version="1" comment="libtiff-x86 is &lt;3.8.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066573" version="1" comment="libtiff is &lt;3.8.2-5.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067842" version="1" comment="postfix is &lt;2.5.6-4.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104389" version="1" comment="postfix is &lt;2.2.9-10.30" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068586" version="1" comment="pure-ftpd is &lt;1.0.22-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068973" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068974" version="1" comment="php5-bcmath is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068975" version="1" comment="php5-bz2 is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068976" version="1" comment="php5-calendar is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068977" version="1" comment="php5-ctype is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068978" version="1" comment="php5-curl is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068979" version="1" comment="php5-dba is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068980" version="1" comment="php5-dbase is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068981" version="1" comment="php5-devel is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068982" version="1" comment="php5-dom is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068983" version="1" comment="php5-exif is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068984" version="1" comment="php5-fastcgi is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068985" version="1" comment="php5-ftp is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068986" version="1" comment="php5-gd is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068987" version="1" comment="php5-gettext is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068988" version="1" comment="php5-gmp is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068989" version="1" comment="php5-hash is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068990" version="1" comment="php5-iconv is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068991" version="1" comment="php5-imap is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068992" version="1" comment="php5-json is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068993" version="1" comment="php5-ldap is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068994" version="1" comment="php5-mbstring is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068995" version="1" comment="php5-mcrypt is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068996" version="1" comment="php5-mhash is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068997" version="1" comment="php5-mysql is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068998" version="1" comment="php5-ncurses is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068999" version="1" comment="php5-odbc is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069000" version="1" comment="php5-openssl is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069001" version="1" comment="php5-pcntl is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069002" version="1" comment="php5-pdo is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069003" version="1" comment="php5-pear is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069004" version="1" comment="php5-pgsql is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069005" version="1" comment="php5-posix is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069006" version="1" comment="php5-pspell is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069007" version="1" comment="php5-shmop is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069008" version="1" comment="php5-snmp is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069009" version="1" comment="php5-soap is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069010" version="1" comment="php5-sockets is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069011" version="1" comment="php5-sqlite is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069012" version="1" comment="php5-suhosin is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069013" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069014" version="1" comment="php5-sysvsem is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069015" version="1" comment="php5-sysvshm is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069016" version="1" comment="php5-tokenizer is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069017" version="1" comment="php5-wddx is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069018" version="1" comment="php5-xmlreader is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069019" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069020" version="1" comment="php5-xsl is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069021" version="1" comment="php5-zlib is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069022" version="1" comment="php5-tidy is &lt;5.2.14-0.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066923" version="1" comment="evince is &lt;0.4.0-25.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067152" version="1" comment="evince is &lt;0.4.0-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067153" version="1" comment="xorg-x11-Xnest is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067154" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067155" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067156" version="1" comment="xorg-x11-devel-32bit is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067169" version="1" comment="xorg-x11-devel-64bit is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067157" version="1" comment="xorg-x11-devel is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067170" version="1" comment="xorg-x11-doc is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067158" version="1" comment="xorg-x11-fonts-100dpi is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067159" version="1" comment="xorg-x11-fonts-75dpi is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067160" version="1" comment="xorg-x11-fonts-cyrillic is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067161" version="1" comment="xorg-x11-fonts-scalable is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067162" version="1" comment="xorg-x11-fonts-syriac is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067163" version="1" comment="xorg-x11-libs-32bit is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067171" version="1" comment="xorg-x11-libs-64bit is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067172" version="1" comment="xorg-x11-libs-x86 is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067164" version="1" comment="xorg-x11-libs is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067165" version="1" comment="xorg-x11-man is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067173" version="1" comment="xorg-x11-sdk is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067166" version="1" comment="xorg-x11-server-glx is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067167" version="1" comment="xorg-x11-server is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067168" version="1" comment="xorg-x11 is &lt;6.9.0-50.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067174" version="1" comment="xorg-x11-Xnest is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067175" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067176" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067177" version="1" comment="xorg-x11-devel-32bit is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067190" version="1" comment="xorg-x11-devel-64bit is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067178" version="1" comment="xorg-x11-devel is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067191" version="1" comment="xorg-x11-doc is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067179" version="1" comment="xorg-x11-fonts-100dpi is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067180" version="1" comment="xorg-x11-fonts-75dpi is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067181" version="1" comment="xorg-x11-fonts-cyrillic is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067182" version="1" comment="xorg-x11-fonts-scalable is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067183" version="1" comment="xorg-x11-fonts-syriac is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067184" version="1" comment="xorg-x11-libs-32bit is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067192" version="1" comment="xorg-x11-libs-64bit is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067193" version="1" comment="xorg-x11-libs-x86 is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067185" version="1" comment="xorg-x11-libs is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067186" version="1" comment="xorg-x11-man is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067194" version="1" comment="xorg-x11-sdk is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067187" version="1" comment="xorg-x11-server-glx is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067188" version="1" comment="xorg-x11-server is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067189" version="1" comment="xorg-x11 is &lt;6.9.0-50.69.69.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067271" version="1" comment="nbd is &lt;2.9.20-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069178" version="1" comment="glibc-32bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069188" version="1" comment="glibc-64bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069179" version="1" comment="glibc-devel-32bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069189" version="1" comment="glibc-devel-64bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069180" version="1" comment="glibc-devel is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069181" version="1" comment="glibc-html is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069182" version="1" comment="glibc-i18ndata is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069183" version="1" comment="glibc-info is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069184" version="1" comment="glibc-locale-32bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069190" version="1" comment="glibc-locale-64bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069191" version="1" comment="glibc-locale-x86 is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069185" version="1" comment="glibc-locale is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069192" version="1" comment="glibc-profile-32bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069193" version="1" comment="glibc-profile-64bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069194" version="1" comment="glibc-profile-x86 is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069195" version="1" comment="glibc-profile is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069196" version="1" comment="glibc-x86 is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069186" version="1" comment="glibc is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069187" version="1" comment="nscd is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069197" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069198" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069199" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069200" version="1" comment="glibc-dceext is &lt;2.4-31.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069201" version="1" comment="glibc-32bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069202" version="1" comment="glibc-64bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069203" version="1" comment="glibc-devel-32bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069204" version="1" comment="glibc-devel-64bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069205" version="1" comment="glibc-devel is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069206" version="1" comment="glibc-html is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069207" version="1" comment="glibc-i18ndata is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069208" version="1" comment="glibc-info is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069209" version="1" comment="glibc-locale-32bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069210" version="1" comment="glibc-locale-64bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069211" version="1" comment="glibc-locale-x86 is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069212" version="1" comment="glibc-locale is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069213" version="1" comment="glibc-profile-32bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069214" version="1" comment="glibc-profile-64bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069215" version="1" comment="glibc-profile-x86 is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069216" version="1" comment="glibc-profile is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069217" version="1" comment="glibc-x86 is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069218" version="1" comment="glibc is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069219" version="1" comment="nscd is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069220" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069221" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069222" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069223" version="1" comment="glibc-dceext is &lt;2.4-31.77.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076279" version="1" comment="ofed-cxgb3-NIC-kmp-bigsmp is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076280" version="1" comment="ofed-cxgb3-NIC-kmp-debug is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076281" version="1" comment="ofed-cxgb3-NIC-kmp-default is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076282" version="1" comment="ofed-cxgb3-NIC-kmp-kdump is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076283" version="1" comment="ofed-cxgb3-NIC-kmp-kdumppae is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076284" version="1" comment="ofed-cxgb3-NIC-kmp-ppc64 is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076285" version="1" comment="ofed-cxgb3-NIC-kmp-smp is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076286" version="1" comment="ofed-cxgb3-NIC-kmp-vmi is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076287" version="1" comment="ofed-cxgb3-NIC-kmp-vmipae is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076288" version="1" comment="ofed-doc is &lt;1.5.2-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076289" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076290" version="1" comment="ofed-kmp-debug is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076291" version="1" comment="ofed-kmp-default is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076292" version="1" comment="ofed-kmp-kdump is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076293" version="1" comment="ofed-kmp-kdumppae is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076294" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076295" version="1" comment="ofed-kmp-smp is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076296" version="1" comment="ofed-kmp-vmi is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076297" version="1" comment="ofed-kmp-vmipae is &lt;1.5.2_2.6.16.60_0.99.13-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076298" version="1" comment="ofed is &lt;1.5.2-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076299" version="1" comment="ofed-devel is &lt;1.5.2-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069075" version="1" comment="cvs2svn is &lt;1.3.0-30.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069076" version="1" comment="subversion-devel is &lt;1.3.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069077" version="1" comment="subversion-python is &lt;1.3.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069078" version="1" comment="subversion-server is &lt;1.3.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069079" version="1" comment="subversion-tools is &lt;1.3.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069080" version="1" comment="subversion is &lt;1.3.1-1.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069081" version="1" comment="viewcvs is &lt;1.0.5-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068166" version="1" comment="cifs-mount is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068167" version="1" comment="ldapsmb is &lt;1.34b-25.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068179" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068180" version="1" comment="libmsrpc is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068168" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068181" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068169" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068182" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068170" version="1" comment="libsmbclient is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068171" version="1" comment="samba-32bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068183" version="1" comment="samba-64bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068172" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068184" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068185" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068173" version="1" comment="samba-client is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068174" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068186" version="1" comment="samba-python is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068175" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068176" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068187" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068188" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068177" version="1" comment="samba-winbind is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068189" version="1" comment="samba-x86 is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068178" version="1" comment="samba is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068190" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068191" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.14.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068192" version="1" comment="cifs-mount is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068193" version="1" comment="ldapsmb is &lt;1.34b-25.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068205" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068206" version="1" comment="libmsrpc is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068194" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068207" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068195" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068208" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068196" version="1" comment="libsmbclient is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068197" version="1" comment="samba-32bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068209" version="1" comment="samba-64bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068198" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068210" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068211" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068199" version="1" comment="samba-client is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068200" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068212" version="1" comment="samba-python is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068201" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068202" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068213" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068214" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068203" version="1" comment="samba-winbind is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068215" version="1" comment="samba-x86 is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068204" version="1" comment="samba is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068216" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068217" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069778" version="1" comment="kernel-default is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069779" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069780" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069781" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069782" version="1" comment="kernel-source is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069783" version="1" comment="kernel-syms is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070561" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070562" version="1" comment="kernel-debug is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070563" version="1" comment="kernel-default is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070564" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070565" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070566" version="1" comment="kernel-smp is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070567" version="1" comment="kernel-source is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070568" version="1" comment="kernel-syms is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070569" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070570" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070571" version="1" comment="kernel-xen is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070572" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069786" version="1" comment="kernel-debug is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069784" version="1" comment="kernel-smp is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069785" version="1" comment="kernel-xen is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070573" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070574" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069787" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069789" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069790" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069791" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069788" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068334" version="1" comment="vsftpd is &lt;2.0.4-19.18.222.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074609" version="1" comment="t1lib-devel is &lt;1.3.1-585.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074608" version="1" comment="t1lib is &lt;1.3.1-585.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070125" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070126" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070127" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070128" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.10-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069680" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069681" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069682" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069683" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069684" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069685" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069686" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069687" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069688" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069689" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr12.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069455" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069456" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069457" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069458" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069459" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069460" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069461" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069462" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069463" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069464" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069465" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.2-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069466" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069467" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069468" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069469" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069470" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069471" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069472" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069473" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069474" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069475" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069476" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068743" version="1" comment="vino is &lt;2.12.0-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066978" version="1" comment="pure-ftpd is &lt;1.0.22-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066982" version="1" comment="dhcpcd is &lt;1.3.22pl4-223.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067061" version="1" comment="dhcpcd is &lt;1.3.22pl4-223.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104390" version="1" comment="dhcp-client is &lt;3.0.7-7.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104391" version="1" comment="dhcp-devel is &lt;3.0.7-7.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104392" version="1" comment="dhcp-relay is &lt;3.0.7-7.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104393" version="1" comment="dhcp-server is &lt;3.0.7-7.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104394" version="1" comment="dhcp is &lt;3.0.7-7.4.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067261" version="1" comment="dhcp6 is &lt;1.0.11-0.13.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104395" version="1" comment="dhcp6 is &lt;1.0.11-0.12.15" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104396" version="1" comment="dhcpcd is &lt;1.3.22pl4-223.15.20" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044232"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067195" version="1" comment="dhcp-client is &lt;3.0.7-7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067197" version="1" comment="dhcp-devel is &lt;3.0.7-7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067198" version="1" comment="dhcp-relay is &lt;3.0.7-7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067199" version="1" comment="dhcp-server is &lt;3.0.7-7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067196" version="1" comment="dhcp is &lt;3.0.7-7.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067200" version="1" comment="dhcp-client is &lt;3.0.7-7.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067202" version="1" comment="dhcp-devel is &lt;3.0.7-7.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067203" version="1" comment="dhcp-relay is &lt;3.0.7-7.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067204" version="1" comment="dhcp-server is &lt;3.0.7-7.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067201" version="1" comment="dhcp is &lt;3.0.7-7.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067205" version="1" comment="dhcp-client is &lt;3.0.7-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067207" version="1" comment="dhcp-devel is &lt;3.0.7-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067208" version="1" comment="dhcp-relay is &lt;3.0.7-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067209" version="1" comment="dhcp-server is &lt;3.0.7-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067206" version="1" comment="dhcp is &lt;3.0.7-7.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066578" version="1" comment="clamav is &lt;0.97-5.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073858" version="1" comment="python-32bit is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073865" version="1" comment="python-64bit is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073859" version="1" comment="python-curses is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073866" version="1" comment="python-demo is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073860" version="1" comment="python-devel is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073867" version="1" comment="python-doc-pdf is &lt;2.4.2-18.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073868" version="1" comment="python-doc is &lt;2.4.2-18.41.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073861" version="1" comment="python-gdbm is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073869" version="1" comment="python-idle is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073862" version="1" comment="python-tk is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073870" version="1" comment="python-x86 is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073863" version="1" comment="python-xml is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073864" version="1" comment="python is &lt;2.4.2-18.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040457"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009066667" version="1" comment="logwatch is &lt;7.3.1-4.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009067212" version="1" comment="logwatch is &lt;7.3.1-4.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070264" version="1" comment="ncpfs-devel is &lt;2.2.6-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070265" version="1" comment="ncpfs is &lt;2.2.6-24.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076031" version="1" comment="glibc-32bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076057" version="1" comment="glibc-64bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076032" version="1" comment="glibc-devel-32bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076058" version="1" comment="glibc-devel-64bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076033" version="1" comment="glibc-devel is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076034" version="1" comment="glibc-html is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076035" version="1" comment="glibc-i18ndata is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076036" version="1" comment="glibc-info is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076037" version="1" comment="glibc-locale-32bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076059" version="1" comment="glibc-locale-64bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076060" version="1" comment="glibc-locale-x86 is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076038" version="1" comment="glibc-locale is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076061" version="1" comment="glibc-profile-32bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076062" version="1" comment="glibc-profile-64bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076063" version="1" comment="glibc-profile-x86 is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076064" version="1" comment="glibc-profile is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076065" version="1" comment="glibc-x86 is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076039" version="1" comment="glibc is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076040" version="1" comment="nscd is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076066" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076067" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076068" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076069" version="1" comment="glibc-dceext is &lt;2.4-31.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072461" version="1" comment="finch-devel is &lt;2.6.6-0.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072458" version="1" comment="finch is &lt;2.6.6-0.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072462" version="1" comment="libpurple-devel is &lt;2.6.6-0.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072459" version="1" comment="libpurple is &lt;2.6.6-0.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072463" version="1" comment="pidgin-devel is &lt;2.6.6-0.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072460" version="1" comment="pidgin is &lt;2.6.6-0.12.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068588" version="1" comment="logrotate is &lt;3.7.3-13.13.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068589" version="1" comment="logrotate is &lt;3.7.3-13.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069241" version="1" comment="xen-devel is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069242" version="1" comment="xen-doc-html is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069243" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069244" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069245" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069254" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069246" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069255" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069256" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069247" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069257" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069258" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039685"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069248" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069249" version="1" comment="xen-libs is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069250" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069251" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069252" version="1" comment="xen-tools is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069253" version="1" comment="xen is &lt;3.2.3_17040_36-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070575" version="1" comment="xen-devel is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070576" version="1" comment="xen-doc-html is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070577" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070578" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070579" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070580" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070581" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070582" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070583" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070584" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070585" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070586" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070587" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070588" version="1" comment="xen-libs is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070589" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070590" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070591" version="1" comment="xen-tools is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070592" version="1" comment="xen is &lt;3.2.3_17040_26-0.6.2.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068701" version="1" comment="gimp-devel is &lt;2.2.10-22.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068702" version="1" comment="gimp is &lt;2.2.10-22.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074355" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.8.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074356" version="1" comment="MozillaFirefox-translations is &lt;10.0.4-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074357" version="1" comment="MozillaFirefox is &lt;10.0.4-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074362" version="1" comment="firefox3-gtk2-32bit is &lt;2.10.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074363" version="1" comment="firefox3-gtk2 is &lt;2.10.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074365" version="1" comment="mozilla-nss-32bit is &lt;3.13.4-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074369" version="1" comment="mozilla-nss-64bit is &lt;3.13.4-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074366" version="1" comment="mozilla-nss-devel is &lt;3.13.4-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074367" version="1" comment="mozilla-nss-tools is &lt;3.13.4-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074370" version="1" comment="mozilla-nss-x86 is &lt;3.13.4-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074368" version="1" comment="mozilla-nss is &lt;3.13.4-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074371" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.4-0.7.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074358" version="1" comment="beagle-evolution is &lt;0.2.18-78.13.1.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074359" version="1" comment="beagle-firefox is &lt;0.2.18-78.13.1.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074360" version="1" comment="beagle-gui is &lt;0.2.18-78.13.1.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074361" version="1" comment="beagle is &lt;0.2.18-78.13.1.102" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074372" version="1" comment="firefox3-autoconf261 is &lt;2.61-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074373" version="1" comment="firefox3-binutils is &lt;2.21.1-0.8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074374" version="1" comment="firefox3-gtk2-devel is &lt;2.10.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074375" version="1" comment="firefox3-gtk2-doc is &lt;2.10.6-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074376" version="1" comment="firefox3-make is &lt;3.81-0.129.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074377" version="1" comment="firefox3-python-base is &lt;2.6.8-0.7.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074378" version="1" comment="yasm-devel is &lt;1.1.0-10.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074379" version="1" comment="yasm is &lt;1.1.0-10.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075707" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075708" version="1" comment="php5-bcmath is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075709" version="1" comment="php5-bz2 is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075710" version="1" comment="php5-calendar is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075711" version="1" comment="php5-ctype is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075712" version="1" comment="php5-curl is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075713" version="1" comment="php5-dba is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075714" version="1" comment="php5-dbase is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075715" version="1" comment="php5-devel is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075716" version="1" comment="php5-dom is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075717" version="1" comment="php5-exif is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075718" version="1" comment="php5-fastcgi is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075719" version="1" comment="php5-ftp is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075720" version="1" comment="php5-gd is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075721" version="1" comment="php5-gettext is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075722" version="1" comment="php5-gmp is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075723" version="1" comment="php5-hash is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075724" version="1" comment="php5-iconv is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075725" version="1" comment="php5-imap is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075726" version="1" comment="php5-json is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075727" version="1" comment="php5-ldap is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075728" version="1" comment="php5-mbstring is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075729" version="1" comment="php5-mcrypt is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075730" version="1" comment="php5-mhash is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075731" version="1" comment="php5-mysql is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075732" version="1" comment="php5-ncurses is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075733" version="1" comment="php5-odbc is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075734" version="1" comment="php5-openssl is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075735" version="1" comment="php5-pcntl is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075736" version="1" comment="php5-pdo is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075737" version="1" comment="php5-pear is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075738" version="1" comment="php5-pgsql is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075739" version="1" comment="php5-posix is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075740" version="1" comment="php5-pspell is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075741" version="1" comment="php5-shmop is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075742" version="1" comment="php5-snmp is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075743" version="1" comment="php5-soap is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075744" version="1" comment="php5-sockets is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075745" version="1" comment="php5-sqlite is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075746" version="1" comment="php5-suhosin is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075747" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075748" version="1" comment="php5-sysvsem is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075749" version="1" comment="php5-sysvshm is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075750" version="1" comment="php5-tokenizer is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075751" version="1" comment="php5-wddx is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075752" version="1" comment="php5-xmlreader is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075753" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075754" version="1" comment="php5-xsl is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075755" version="1" comment="php5-zlib is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075756" version="1" comment="php5-tidy is &lt;5.2.14-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072233" version="1" comment="apache2-devel is &lt;2.2.3-16.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072234" version="1" comment="apache2-doc is &lt;2.2.3-16.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072235" version="1" comment="apache2-example-pages is &lt;2.2.3-16.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072236" version="1" comment="apache2-prefork is &lt;2.2.3-16.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072237" version="1" comment="apache2-worker is &lt;2.2.3-16.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072238" version="1" comment="apache2 is &lt;2.2.3-16.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070816" version="1" comment="perl-32bit is &lt;5.8.8-14.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070817" version="1" comment="perl-64bit is &lt;5.8.8-14.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070818" version="1" comment="perl-x86 is &lt;5.8.8-14.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070819" version="1" comment="perl is &lt;5.8.8-14.19.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068548" version="1" comment="python-32bit is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068555" version="1" comment="python-64bit is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068549" version="1" comment="python-curses is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068556" version="1" comment="python-demo is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068550" version="1" comment="python-devel is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068551" version="1" comment="python-gdbm is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068557" version="1" comment="python-idle is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068552" version="1" comment="python-tk is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068558" version="1" comment="python-x86 is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068553" version="1" comment="python-xml is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068554" version="1" comment="python is &lt;2.4.2-18.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068559" version="1" comment="python-32bit is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068560" version="1" comment="python-64bit is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068561" version="1" comment="python-curses is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068562" version="1" comment="python-demo is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068563" version="1" comment="python-devel is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068564" version="1" comment="python-gdbm is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068565" version="1" comment="python-idle is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068566" version="1" comment="python-tk is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068567" version="1" comment="python-x86 is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068568" version="1" comment="python-xml is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068569" version="1" comment="python is &lt;2.4.2-18.34.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069532" version="1" comment="nagios-www is &lt;2.6-13.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069533" version="1" comment="nagios is &lt;2.6-13.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072356" version="1" comment="krb5-32bit is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072361" version="1" comment="krb5-64bit is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072362" version="1" comment="krb5-apps-clients is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072363" version="1" comment="krb5-apps-servers is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072357" version="1" comment="krb5-client is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072358" version="1" comment="krb5-devel-32bit is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072364" version="1" comment="krb5-devel-64bit is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072359" version="1" comment="krb5-devel is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072365" version="1" comment="krb5-server is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072366" version="1" comment="krb5-x86 is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072360" version="1" comment="krb5 is &lt;1.4.3-19.49.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040226"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073171" version="1" comment="logrotate is &lt;3.7.3-13.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068729" version="1" comment="wireshark-devel is &lt;1.4.4-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068728" version="1" comment="wireshark is &lt;1.4.4-0.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068571" version="1" comment="rdesktop is &lt;1.6.0-39.6.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068353" version="1" comment="postfix is &lt;2.5.6-4.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104397" version="1" comment="kernel-default is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104398" version="1" comment="kernel-source is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104399" version="1" comment="kernel-syms is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104400" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104401" version="1" comment="kernel-debug is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104402" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104403" version="1" comment="kernel-smp is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104404" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104405" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104406" version="1" comment="kernel-xen is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104407" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.42.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068735" version="1" comment="bind-chrootenv is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068736" version="1" comment="bind-devel-64bit is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068737" version="1" comment="bind-devel is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068738" version="1" comment="bind-doc is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068732" version="1" comment="bind-libs-32bit is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068739" version="1" comment="bind-libs-64bit is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068740" version="1" comment="bind-libs-x86 is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068733" version="1" comment="bind-libs is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068734" version="1" comment="bind-utils is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068741" version="1" comment="bind is &lt;9.6ESVR4P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069477" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069478" version="1" comment="cyrus-imapd is &lt;2.2.12-27.16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069479" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069480" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069485" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069486" version="1" comment="cyrus-imapd is &lt;2.2.12-27.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069487" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069488" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070000" version="1" comment="xen-devel is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070001" version="1" comment="xen-doc-html is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070002" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070003" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070004" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070013" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070005" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070014" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070015" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070006" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070016" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070017" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070007" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070008" version="1" comment="xen-libs is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070009" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070010" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070011" version="1" comment="xen-tools is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070012" version="1" comment="xen is &lt;3.2.3_17040_37-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069546" version="1" comment="libxml2-32bit is &lt;2.6.23-15.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069550" version="1" comment="libxml2-64bit is &lt;2.6.23-15.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069547" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069551" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069548" version="1" comment="libxml2-devel is &lt;2.6.23-15.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069552" version="1" comment="libxml2-x86 is &lt;2.6.23-15.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069549" version="1" comment="libxml2 is &lt;2.6.23-15.25.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068791" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068792" version="1" comment="openssl-64bit is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068793" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068794" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068795" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068796" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068797" version="1" comment="openssl-x86 is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068798" version="1" comment="openssl is &lt;0.9.8a-18.45.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068799" version="1" comment="openssl-32bit is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068803" version="1" comment="openssl-64bit is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068800" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068804" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068801" version="1" comment="openssl-devel is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068805" version="1" comment="openssl-doc is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068806" version="1" comment="openssl-x86 is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009068802" version="1" comment="openssl is &lt;0.9.8a-18.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069096" version="1" comment="libgnomesu-devel is &lt;1.0.0-32.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069097" version="1" comment="libgnomesu is &lt;1.0.0-32.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039659"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071188" version="1" comment="wireshark-devel is &lt;1.4.4-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071189" version="1" comment="wireshark is &lt;1.4.4-0.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069331" version="1" comment="tftp is &lt;0.48-1.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069423" version="1" comment="dbus-1-32bit is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069428" version="1" comment="dbus-1-64bit is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069424" version="1" comment="dbus-1-devel is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069425" version="1" comment="dbus-1-glib-32bit is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069429" version="1" comment="dbus-1-glib-64bit is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069430" version="1" comment="dbus-1-glib-x86 is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069426" version="1" comment="dbus-1-glib is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069431" version="1" comment="dbus-1-x86 is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069427" version="1" comment="dbus-1 is &lt;0.60-33.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070174" version="1" comment="tomcat5-admin-webapps is &lt;5.5.27-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070175" version="1" comment="tomcat5-webapps is &lt;5.5.27-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070176" version="1" comment="tomcat5 is &lt;5.5.27-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070820" version="1" comment="MozillaFirefox-translations is &lt;3.6.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070821" version="1" comment="MozillaFirefox is &lt;3.6.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070822" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.23-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070823" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.23-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070824" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.23-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070825" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.23-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070826" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.23-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070827" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.23-1.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070828" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.23-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071938" version="1" comment="mozilla-nss-32bit is &lt;3.13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071942" version="1" comment="mozilla-nss-64bit is &lt;3.13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071939" version="1" comment="mozilla-nss-devel is &lt;3.13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071940" version="1" comment="mozilla-nss-tools is &lt;3.13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071943" version="1" comment="mozilla-nss-x86 is &lt;3.13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071941" version="1" comment="mozilla-nss is &lt;3.13.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069390" version="1" comment="bind-chrootenv is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069391" version="1" comment="bind-devel-64bit is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069392" version="1" comment="bind-devel is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069393" version="1" comment="bind-doc is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069387" version="1" comment="bind-libs-32bit is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069394" version="1" comment="bind-libs-64bit is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069395" version="1" comment="bind-libs-x86 is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069388" version="1" comment="bind-libs is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069389" version="1" comment="bind-utils is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069396" version="1" comment="bind is &lt;9.6ESVR4P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070629" version="1" comment="yast2-core-devel is &lt;2.13.48-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070628" version="1" comment="yast2-core is &lt;2.13.48-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069941" version="1" comment="glibc-32bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069956" version="1" comment="glibc-64bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069942" version="1" comment="glibc-devel-32bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069957" version="1" comment="glibc-devel-64bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069943" version="1" comment="glibc-devel is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069944" version="1" comment="glibc-html is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069945" version="1" comment="glibc-i18ndata is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069946" version="1" comment="glibc-info is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069947" version="1" comment="glibc-locale-32bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069958" version="1" comment="glibc-locale-64bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069959" version="1" comment="glibc-locale-x86 is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069948" version="1" comment="glibc-locale is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069960" version="1" comment="glibc-profile-32bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069961" version="1" comment="glibc-profile-64bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069962" version="1" comment="glibc-profile-x86 is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069963" version="1" comment="glibc-profile is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069964" version="1" comment="glibc-x86 is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069949" version="1" comment="glibc is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069950" version="1" comment="libxcrypt-32bit is &lt;2.4-12.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069965" version="1" comment="libxcrypt-64bit is &lt;2.4-12.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069966" version="1" comment="libxcrypt-devel is &lt;2.4-12.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069967" version="1" comment="libxcrypt-x86 is &lt;2.4-12.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069951" version="1" comment="libxcrypt is &lt;2.4-12.9.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069952" version="1" comment="nscd is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069953" version="1" comment="pam-modules-32bit is &lt;10-2.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069968" version="1" comment="pam-modules-64bit is &lt;10-2.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069969" version="1" comment="pam-modules-x86 is &lt;10-2.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069954" version="1" comment="pam-modules is &lt;10-2.17.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069970" version="1" comment="pwdutils-plugin-audit is &lt;3.0.7.1-17.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069955" version="1" comment="pwdutils is &lt;3.0.7.1-17.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069971" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069972" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069973" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069974" version="1" comment="glibc-dceext is &lt;2.4-31.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069975" version="1" comment="glibc-32bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069976" version="1" comment="glibc-64bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069977" version="1" comment="glibc-devel-32bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069978" version="1" comment="glibc-devel-64bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069979" version="1" comment="glibc-devel is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069980" version="1" comment="glibc-html is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069981" version="1" comment="glibc-i18ndata is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069982" version="1" comment="glibc-info is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069983" version="1" comment="glibc-locale-32bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069984" version="1" comment="glibc-locale-64bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069985" version="1" comment="glibc-locale-x86 is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069986" version="1" comment="glibc-locale is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069987" version="1" comment="glibc-profile-32bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069988" version="1" comment="glibc-profile-64bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069989" version="1" comment="glibc-profile-x86 is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069990" version="1" comment="glibc-profile is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069991" version="1" comment="glibc-x86 is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069992" version="1" comment="glibc is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069993" version="1" comment="nscd is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069994" version="1" comment="pwdutils-plugin-audit is &lt;3.0.7.1-17.34.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034646"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069995" version="1" comment="pwdutils is &lt;3.0.7.1-17.34.36.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069996" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069997" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069998" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069999" version="1" comment="glibc-dceext is &lt;2.4-31.77.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075810" version="1" comment="postgresql-contrib is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075806" version="1" comment="postgresql-devel is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075811" version="1" comment="postgresql-docs is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075807" version="1" comment="postgresql-libs-32bit is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075812" version="1" comment="postgresql-libs-64bit is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075813" version="1" comment="postgresql-libs-x86 is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075808" version="1" comment="postgresql-libs is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075814" version="1" comment="postgresql-pl is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075815" version="1" comment="postgresql-server is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075816" version="1" comment="postgresql is &lt;8.1.23-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040726"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070630" version="1" comment="yast2-core-devel is &lt;2.13.48-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030807"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070631" version="1" comment="yast2-core is &lt;2.13.48-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030808"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074864" version="1" comment="gdk-pixbuf-32bit is &lt;0.22.0-93.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074880" version="1" comment="gdk-pixbuf-64bit is &lt;0.22.0-93.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074881" version="1" comment="gdk-pixbuf-x86 is &lt;0.22.0-93.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074865" version="1" comment="gdk-pixbuf is &lt;0.22.0-93.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074882" version="1" comment="gdk-pixbuf-devel is &lt;0.22.0-93.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074866" version="1" comment="gtk2-32bit is &lt;2.8.11-0.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074883" version="1" comment="gtk2-64bit is &lt;2.8.11-0.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074884" version="1" comment="gtk2-devel-64bit is &lt;2.8.11-0.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074867" version="1" comment="gtk2-devel is &lt;2.8.11-0.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074868" version="1" comment="gtk2-doc is &lt;2.8.11-0.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074885" version="1" comment="gtk2-x86 is &lt;2.8.11-0.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074869" version="1" comment="gtk2 is &lt;2.8.11-0.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069591" version="1" comment="opie is &lt;2.4-567.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069592" version="1" comment="permissions is &lt;2011.6.28-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104408" version="1" comment="kernel-default is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104409" version="1" comment="kernel-source is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104410" version="1" comment="kernel-syms is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104411" version="1" comment="kernel-debug is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104412" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104413" version="1" comment="kernel-smp is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104414" version="1" comment="kernel-xen is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104415" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104416" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104417" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104418" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104419" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069799" version="1" comment="libvirt-devel is &lt;0.3.3-18.20.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069800" version="1" comment="libvirt-python is &lt;0.3.3-18.20.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069801" version="1" comment="libvirt is &lt;0.3.3-18.20.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069804" version="1" comment="libvirt-devel is &lt;0.3.3-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069802" version="1" comment="libvirt-python is &lt;0.3.3-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069803" version="1" comment="libvirt is &lt;0.3.3-18.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070347" version="1" comment="cifs-mount is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070348" version="1" comment="ldapsmb is &lt;1.34b-25.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070360" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070361" version="1" comment="libmsrpc is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070349" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070362" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070350" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070363" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070351" version="1" comment="libsmbclient is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070352" version="1" comment="samba-32bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070364" version="1" comment="samba-64bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070353" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070365" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070366" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070354" version="1" comment="samba-client is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070355" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070367" version="1" comment="samba-python is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070356" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070357" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070368" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070369" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070358" version="1" comment="samba-winbind is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070370" version="1" comment="samba-x86 is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070359" version="1" comment="samba is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070371" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070372" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.16.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070382" version="1" comment="cifs-mount is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070383" version="1" comment="ldapsmb is &lt;1.34b-25.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070384" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070385" version="1" comment="libmsrpc is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070386" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070387" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070388" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070389" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070390" version="1" comment="libsmbclient is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070391" version="1" comment="samba-32bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070392" version="1" comment="samba-64bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070393" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070394" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070395" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070396" version="1" comment="samba-client is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070397" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070398" version="1" comment="samba-python is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070399" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070400" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070401" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070402" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070403" version="1" comment="samba-winbind is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070404" version="1" comment="samba-x86 is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070405" version="1" comment="samba is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070406" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070407" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071946" version="1" comment="wireshark-devel is &lt;1.4.10-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071945" version="1" comment="wireshark is &lt;1.4.10-0.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070145" version="1" comment="vpnc is &lt;0.5.1-1.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107309" version="1" comment="libreoffice-cs is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107311" version="1" comment="libreoffice-de is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107314" version="1" comment="libreoffice-es is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107316" version="1" comment="libreoffice-fr is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107317" version="1" comment="libreoffice-galleries is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107318" version="1" comment="libreoffice-gnome is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107321" version="1" comment="libreoffice-hu is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107322" version="1" comment="libreoffice-it is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107323" version="1" comment="libreoffice-ja is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107324" version="1" comment="libreoffice-kde is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107326" version="1" comment="libreoffice-mono is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107330" version="1" comment="libreoffice-pl is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107331" version="1" comment="libreoffice-pt-BR is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107333" version="1" comment="libreoffice-sk is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107336" version="1" comment="libreoffice-zh-CN is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107337" version="1" comment="libreoffice-zh-TW is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107339" version="1" comment="libreoffice is &lt;3.4.2.6-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076979" version="1" comment="ruby-devel is &lt;1.8.6.p369-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076980" version="1" comment="ruby-doc-html is &lt;1.8.6.p369-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076981" version="1" comment="ruby-doc-ri is &lt;1.8.6.p369-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076982" version="1" comment="ruby-examples is &lt;1.8.6.p369-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076983" version="1" comment="ruby-test-suite is &lt;1.8.6.p369-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076984" version="1" comment="ruby-tk is &lt;1.8.6.p369-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076967" version="1" comment="ruby is &lt;1.8.6.p369-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009069769" version="1" comment="foomatic-filters is &lt;3.0.2-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074791" version="1" comment="libgssapi-32bit is &lt;0.6-13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074793" version="1" comment="libgssapi-64bit is &lt;0.6-13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074794" version="1" comment="libgssapi-x86 is &lt;0.6-13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074792" version="1" comment="libgssapi is &lt;0.6-13.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070055" version="1" comment="clamav is &lt;0.97.2-1.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076769" version="1" comment="perl-32bit is &lt;5.8.8-14.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076779" version="1" comment="perl-64bit is &lt;5.8.8-14.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076780" version="1" comment="perl-x86 is &lt;5.8.8-14.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076770" version="1" comment="perl is &lt;5.8.8-14.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070481" version="1" comment="dhcp-client is &lt;3.0.7-7.7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070482" version="1" comment="dhcp-devel is &lt;3.0.7-7.7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070483" version="1" comment="dhcp-relay is &lt;3.0.7-7.7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070484" version="1" comment="dhcp-server is &lt;3.0.7-7.7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070485" version="1" comment="dhcp is &lt;3.0.7-7.7.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070487" version="1" comment="dhcp-client is &lt;3.0.7-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070489" version="1" comment="dhcp-devel is &lt;3.0.7-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070490" version="1" comment="dhcp-relay is &lt;3.0.7-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070491" version="1" comment="dhcp-server is &lt;3.0.7-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070488" version="1" comment="dhcp is &lt;3.0.7-7.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072070" version="1" comment="xorg-x11-Xnest is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072071" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072072" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072073" version="1" comment="xorg-x11-devel-32bit is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072086" version="1" comment="xorg-x11-devel-64bit is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072074" version="1" comment="xorg-x11-devel is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072087" version="1" comment="xorg-x11-doc is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072075" version="1" comment="xorg-x11-fonts-100dpi is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072076" version="1" comment="xorg-x11-fonts-75dpi is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072077" version="1" comment="xorg-x11-fonts-cyrillic is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072078" version="1" comment="xorg-x11-fonts-scalable is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072079" version="1" comment="xorg-x11-fonts-syriac is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072080" version="1" comment="xorg-x11-libs-32bit is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072088" version="1" comment="xorg-x11-libs-64bit is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072089" version="1" comment="xorg-x11-libs-x86 is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072081" version="1" comment="xorg-x11-libs is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072082" version="1" comment="xorg-x11-man is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072090" version="1" comment="xorg-x11-sdk is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072083" version="1" comment="xorg-x11-server-glx is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072084" version="1" comment="xorg-x11-server is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072085" version="1" comment="xorg-x11 is &lt;6.9.0-50.76.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040175"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072149" version="1" comment="freetype2-32bit is &lt;2.1.10-18.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072153" version="1" comment="freetype2-64bit is &lt;2.1.10-18.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072150" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072154" version="1" comment="freetype2-devel-64bit is &lt;2.1.10-18.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072151" version="1" comment="freetype2-devel is &lt;2.1.10-18.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072155" version="1" comment="freetype2-x86 is &lt;2.1.10-18.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072152" version="1" comment="freetype2 is &lt;2.1.10-18.27.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071518" version="1" comment="gimp-devel is &lt;2.2.10-22.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071519" version="1" comment="gimp is &lt;2.2.10-22.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071524" version="1" comment="gimp-devel is &lt;2.2.10-22.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071525" version="1" comment="gimp is &lt;2.2.10-22.35.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070195" version="1" comment="xen-devel is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070196" version="1" comment="xen-doc-html is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070197" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070198" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070199" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070208" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070200" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070209" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070210" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070201" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070211" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070212" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070202" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070203" version="1" comment="xen-libs is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070204" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070205" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070206" version="1" comment="xen-tools is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070207" version="1" comment="xen is &lt;3.2.3_17040_37-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107340" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074610" version="1" comment="kernel-debug is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074611" version="1" comment="kernel-default is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074616" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107342" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074614" version="1" comment="kernel-smp is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074612" version="1" comment="kernel-source is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074613" version="1" comment="kernel-syms is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107343" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107344" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074615" version="1" comment="kernel-xen is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107341" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074617" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074618" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073133" version="1" comment="libpng-32bit is &lt;1.2.8-19.33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073137" version="1" comment="libpng-64bit is &lt;1.2.8-19.33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073134" version="1" comment="libpng-devel-32bit is &lt;1.2.8-19.33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073138" version="1" comment="libpng-devel-64bit is &lt;1.2.8-19.33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073135" version="1" comment="libpng-devel is &lt;1.2.8-19.33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073139" version="1" comment="libpng-x86 is &lt;1.2.8-19.33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073136" version="1" comment="libpng is &lt;1.2.8-19.33.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073034" version="1" comment="MozillaFirefox-translations is &lt;3.6.27-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073035" version="1" comment="MozillaFirefox is &lt;3.6.27-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073036" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.27-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073037" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.27-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073038" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.27-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073039" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.27-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073040" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.27-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073041" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.27-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040357"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073042" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.27-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040356"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074568" version="1" comment="libpng-32bit is &lt;1.2.8-19.35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074572" version="1" comment="libpng-64bit is &lt;1.2.8-19.35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074569" version="1" comment="libpng-devel-32bit is &lt;1.2.8-19.35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074573" version="1" comment="libpng-devel-64bit is &lt;1.2.8-19.35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074570" version="1" comment="libpng-devel is &lt;1.2.8-19.35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074574" version="1" comment="libpng-x86 is &lt;1.2.8-19.35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074571" version="1" comment="libpng is &lt;1.2.8-19.35.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074645" version="1" comment="MozillaFirefox-translations is &lt;10.0.5-0.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074646" version="1" comment="MozillaFirefox is &lt;10.0.5-0.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074647" version="1" comment="mozilla-nspr-32bit is &lt;4.9.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074654" version="1" comment="mozilla-nspr-64bit is &lt;4.9.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074648" version="1" comment="mozilla-nspr-devel is &lt;4.9.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074655" version="1" comment="mozilla-nspr-x86 is &lt;4.9.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074649" version="1" comment="mozilla-nspr is &lt;4.9.1-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074650" version="1" comment="mozilla-nss-32bit is &lt;3.13.5-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074656" version="1" comment="mozilla-nss-64bit is &lt;3.13.5-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074651" version="1" comment="mozilla-nss-devel is &lt;3.13.5-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074652" version="1" comment="mozilla-nss-tools is &lt;3.13.5-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074657" version="1" comment="mozilla-nss-x86 is &lt;3.13.5-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074653" version="1" comment="mozilla-nss is &lt;3.13.5-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074658" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.5-0.8.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074776" version="1" comment="libxml2-32bit is &lt;2.6.23-15.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074780" version="1" comment="libxml2-64bit is &lt;2.6.23-15.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074777" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074781" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074778" version="1" comment="libxml2-devel is &lt;2.6.23-15.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074782" version="1" comment="libxml2-x86 is &lt;2.6.23-15.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074779" version="1" comment="libxml2 is &lt;2.6.23-15.31.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104420" version="1" comment="libxml2-32bit is &lt;2.6.23-15.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104421" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104422" version="1" comment="libxml2-devel is &lt;2.6.23-15.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104423" version="1" comment="libxml2-python is &lt;2.6.23-15.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104424" version="1" comment="libxml2 is &lt;2.6.23-15.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070531" version="1" comment="pure-ftpd is &lt;1.0.22-0.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070907" version="1" comment="tomcat5-admin-webapps is &lt;5.5.27-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070908" version="1" comment="tomcat5-webapps is &lt;5.5.27-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070909" version="1" comment="tomcat5 is &lt;5.5.27-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070536" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070537" version="1" comment="cyrus-imapd is &lt;2.2.12-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070538" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070539" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070553" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.16.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070554" version="1" comment="cyrus-imapd is &lt;2.2.12-27.16.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070555" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.16.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070556" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.16.30.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071475" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071476" version="1" comment="openssl-64bit is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071477" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071478" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071479" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071480" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071481" version="1" comment="openssl-x86 is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071482" version="1" comment="openssl is &lt;0.9.8a-18.45.49.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071484" version="1" comment="openssl-32bit is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071488" version="1" comment="openssl-64bit is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071485" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071489" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071486" version="1" comment="openssl-devel is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071490" version="1" comment="openssl-doc is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071491" version="1" comment="openssl-x86 is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071487" version="1" comment="openssl is &lt;0.9.8a-18.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070598" version="1" comment="quagga-devel is &lt;0.99.9-14.11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009070599" version="1" comment="quagga is &lt;0.99.9-14.11.9" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009039951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071591" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.16.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071592" version="1" comment="cyrus-imapd is &lt;2.2.12-27.16.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071593" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.16.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071594" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.16.32.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071599" version="1" comment="cyrus-imapd-devel is &lt;2.2.12-27.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071600" version="1" comment="cyrus-imapd is &lt;2.2.12-27.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071601" version="1" comment="perl-Cyrus-IMAP is &lt;2.2.12-27.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071602" version="1" comment="perl-Cyrus-SIEVE-managesieve is &lt;2.2.12-27.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071673" version="1" comment="popt-32bit is &lt;1.7-271.37.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071674" version="1" comment="popt-64bit is &lt;1.7-271.37.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071675" version="1" comment="popt-devel-32bit is &lt;1.7-271.37.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071676" version="1" comment="popt-devel-64bit is &lt;1.7-271.37.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071677" version="1" comment="popt-devel is &lt;1.7-271.37.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071678" version="1" comment="popt-x86 is &lt;1.7-271.37.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071679" version="1" comment="popt is &lt;1.7-271.37.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071680" version="1" comment="rpm-devel is &lt;4.4.2-43.38.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071681" version="1" comment="rpm-python is &lt;4.4.2-43.38.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071682" version="1" comment="rpm is &lt;4.4.2-43.38.38.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071683" version="1" comment="popt-32bit is &lt;1.7-271.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071690" version="1" comment="popt-64bit is &lt;1.7-271.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071684" version="1" comment="popt-devel-32bit is &lt;1.7-271.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071691" version="1" comment="popt-devel-64bit is &lt;1.7-271.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071685" version="1" comment="popt-devel is &lt;1.7-271.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071692" version="1" comment="popt-x86 is &lt;1.7-271.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071686" version="1" comment="popt is &lt;1.7-271.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071687" version="1" comment="rpm-devel is &lt;4.4.2-43.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071688" version="1" comment="rpm-python is &lt;4.4.2-43.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071689" version="1" comment="rpm is &lt;4.4.2-43.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072726" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072727" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072728" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072729" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074166" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074177" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074167" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074168" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074170" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074171" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074172" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074173" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074174" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074176" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr13.1-0.8.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072886" version="1" comment="curl-32bit is &lt;7.15.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072889" version="1" comment="curl-64bit is &lt;7.15.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072887" version="1" comment="curl-devel is &lt;7.15.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072890" version="1" comment="curl-x86 is &lt;7.15.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072888" version="1" comment="curl is &lt;7.15.1-19.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072730" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072731" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072732" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072733" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072734" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072735" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072736" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072737" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072738" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072739" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072740" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072098" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072109" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072099" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072100" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072102" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072103" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072104" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072105" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072106" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072108" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr13.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074178" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074179" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074180" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074181" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074182" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074183" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074184" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074185" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074186" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074187" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074188" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr10.1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040479"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074577" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074578" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074579" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074580" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071871" version="1" comment="radvd is &lt;0.9-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071603" version="1" comment="clamav is &lt;0.97.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071955" version="1" comment="MozillaFirefox-translations is &lt;3.6.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071956" version="1" comment="MozillaFirefox is &lt;3.6.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071957" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071958" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071959" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071960" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071961" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071962" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071963" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.24-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072905" version="1" comment="MozillaFirefox-translations is &lt;3.6.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072906" version="1" comment="MozillaFirefox is &lt;3.6.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072907" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072908" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072909" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072910" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072911" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072912" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.26-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072913" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.26-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072741" version="1" comment="libxml2-32bit is &lt;2.6.23-15.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072745" version="1" comment="libxml2-64bit is &lt;2.6.23-15.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072742" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072746" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072743" version="1" comment="libxml2-devel is &lt;2.6.23-15.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072747" version="1" comment="libxml2-x86 is &lt;2.6.23-15.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072744" version="1" comment="libxml2 is &lt;2.6.23-15.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104425" version="1" comment="libxslt-32bit is &lt;1.1.15-15.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104426" version="1" comment="libxslt-devel-32bit is &lt;1.1.15-15.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104427" version="1" comment="libxslt-devel is &lt;1.1.15-15.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104428" version="1" comment="libxslt is &lt;1.1.15-15.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073438" version="1" comment="libxslt-32bit is &lt;1.1.15-15.16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073442" version="1" comment="libxslt-64bit is &lt;1.1.15-15.16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073439" version="1" comment="libxslt-devel-32bit is &lt;1.1.15-15.16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073443" version="1" comment="libxslt-devel-64bit is &lt;1.1.15-15.16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073440" version="1" comment="libxslt-devel is &lt;1.1.15-15.16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073444" version="1" comment="libxslt-x86 is &lt;1.1.15-15.16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073441" version="1" comment="libxslt is &lt;1.1.15-15.16.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072185" version="1" comment="openswan is &lt;2.4.4-18.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072501" version="1" comment="openssl-32bit is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072505" version="1" comment="openssl-64bit is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072502" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072506" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072503" version="1" comment="openssl-devel is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072507" version="1" comment="openssl-doc is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072508" version="1" comment="openssl-x86 is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072504" version="1" comment="openssl is &lt;0.9.8a-18.56.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073302" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073303" version="1" comment="php5-bcmath is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073304" version="1" comment="php5-bz2 is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073305" version="1" comment="php5-calendar is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073306" version="1" comment="php5-ctype is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073307" version="1" comment="php5-curl is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073308" version="1" comment="php5-dba is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073309" version="1" comment="php5-dbase is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073310" version="1" comment="php5-devel is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073311" version="1" comment="php5-dom is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073312" version="1" comment="php5-exif is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073313" version="1" comment="php5-fastcgi is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073314" version="1" comment="php5-ftp is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073315" version="1" comment="php5-gd is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073316" version="1" comment="php5-gettext is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073317" version="1" comment="php5-gmp is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073318" version="1" comment="php5-hash is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073319" version="1" comment="php5-iconv is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073320" version="1" comment="php5-imap is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073321" version="1" comment="php5-json is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073322" version="1" comment="php5-ldap is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073323" version="1" comment="php5-mbstring is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073324" version="1" comment="php5-mcrypt is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073325" version="1" comment="php5-mhash is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073326" version="1" comment="php5-mysql is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073327" version="1" comment="php5-ncurses is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073328" version="1" comment="php5-odbc is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073329" version="1" comment="php5-openssl is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073330" version="1" comment="php5-pcntl is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073331" version="1" comment="php5-pdo is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073332" version="1" comment="php5-pear is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073333" version="1" comment="php5-pgsql is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073334" version="1" comment="php5-posix is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073335" version="1" comment="php5-pspell is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073336" version="1" comment="php5-shmop is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073337" version="1" comment="php5-snmp is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073338" version="1" comment="php5-soap is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073339" version="1" comment="php5-sockets is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073340" version="1" comment="php5-sqlite is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073341" version="1" comment="php5-suhosin is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073342" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073343" version="1" comment="php5-sysvsem is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073344" version="1" comment="php5-sysvshm is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073345" version="1" comment="php5-tokenizer is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073346" version="1" comment="php5-wddx is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073347" version="1" comment="php5-xmlreader is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073348" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073349" version="1" comment="php5-xsl is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073350" version="1" comment="php5-zlib is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073351" version="1" comment="php5-tidy is &lt;5.2.14-0.26.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072925" version="1" comment="sysconfig is &lt;0.50.9-13.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071981" version="1" comment="bind-chrootenv is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071982" version="1" comment="bind-devel-64bit is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071983" version="1" comment="bind-devel is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071984" version="1" comment="bind-doc is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071978" version="1" comment="bind-libs-32bit is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071985" version="1" comment="bind-libs-64bit is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071986" version="1" comment="bind-libs-x86 is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071979" version="1" comment="bind-libs is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071980" version="1" comment="bind-utils is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009071987" version="1" comment="bind is &lt;9.6ESVR5P1-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104429" version="1" comment="bind-chrootenv is &lt;9.3.4-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104430" version="1" comment="bind-devel is &lt;9.3.4-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104431" version="1" comment="bind-doc is &lt;9.3.4-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104432" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104433" version="1" comment="bind-libs is &lt;9.3.4-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104434" version="1" comment="bind-utils is &lt;9.3.4-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104435" version="1" comment="bind is &lt;9.3.4-1.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104436" version="1" comment="bind-chrootenv is &lt;9.3.4-1.31.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104437" version="1" comment="bind-devel is &lt;9.3.4-1.31.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104438" version="1" comment="bind-doc is &lt;9.3.4-1.31.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104439" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.31.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104440" version="1" comment="bind-libs is &lt;9.3.4-1.31.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104441" version="1" comment="bind-utils is &lt;9.3.4-1.31.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104442" version="1" comment="bind is &lt;9.3.4-1.31.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072940" version="1" comment="lighttpd-mod_cml is &lt;1.4.10-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072941" version="1" comment="lighttpd-mod_mysql_vhost is &lt;1.4.10-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072942" version="1" comment="lighttpd-mod_rrdtool is &lt;1.4.10-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072943" version="1" comment="lighttpd-mod_trigger_b4_dl is &lt;1.4.10-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072944" version="1" comment="lighttpd-mod_webdav is &lt;1.4.10-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072945" version="1" comment="lighttpd is &lt;1.4.10-11.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072256" version="1" comment="jasper is &lt;1.701.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072254" version="1" comment="libjasper-32bit is &lt;1.701.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072257" version="1" comment="libjasper-64bit is &lt;1.701.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072258" version="1" comment="libjasper-x86 is &lt;1.701.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072255" version="1" comment="libjasper is &lt;1.701.0-16.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073401" version="1" comment="libreoffice-cs is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073403" version="1" comment="libreoffice-de is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073406" version="1" comment="libreoffice-es is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073408" version="1" comment="libreoffice-fr is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073409" version="1" comment="libreoffice-galleries is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073410" version="1" comment="libreoffice-gnome is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073413" version="1" comment="libreoffice-hu is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073414" version="1" comment="libreoffice-it is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073415" version="1" comment="libreoffice-ja is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073416" version="1" comment="libreoffice-kde is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073418" version="1" comment="libreoffice-mono is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073422" version="1" comment="libreoffice-pl is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073423" version="1" comment="libreoffice-pt-BR is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073425" version="1" comment="libreoffice-sk is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073428" version="1" comment="libreoffice-zh-CN is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073429" version="1" comment="libreoffice-zh-TW is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073431" version="1" comment="libreoffice is &lt;3.4.5.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072946" version="1" comment="tomcat5-admin-webapps is &lt;5.5.27-0.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072947" version="1" comment="tomcat5-webapps is &lt;5.5.27-0.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009072948" version="1" comment="tomcat5 is &lt;5.5.27-0.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075431" version="1" comment="openssh-askpass is &lt;5.1p1-41.12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075432" version="1" comment="openssh is &lt;5.1p1-41.12.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073023" version="1" comment="wireshark-devel is &lt;1.4.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073022" version="1" comment="wireshark is &lt;1.4.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073005" version="1" comment="openssl-32bit is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073009" version="1" comment="openssl-64bit is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073006" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073010" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073007" version="1" comment="openssl-devel is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073011" version="1" comment="openssl-doc is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073012" version="1" comment="openssl-x86 is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073008" version="1" comment="openssl is &lt;0.9.8a-18.60.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074260" version="1" comment="popt-devel is &lt;1.7-271.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074261" version="1" comment="popt is &lt;1.7-271.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074262" version="1" comment="rpm-devel is &lt;4.4.2-43.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074263" version="1" comment="rpm-python is &lt;4.4.2-43.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074264" version="1" comment="rpm is &lt;4.4.2-43.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074258" version="1" comment="popt-32bit is &lt;1.7-271.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074265" version="1" comment="popt-64bit is &lt;1.7-271.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074259" version="1" comment="popt-devel-32bit is &lt;1.7-271.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074266" version="1" comment="popt-devel-64bit is &lt;1.7-271.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074267" version="1" comment="popt-x86 is &lt;1.7-271.46.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104443" version="1" comment="popt-32bit is &lt;1.7-271.37.42.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104444" version="1" comment="popt-devel-32bit is &lt;1.7-271.37.42.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104445" version="1" comment="popt-devel is &lt;1.7-271.37.42.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104446" version="1" comment="popt is &lt;1.7-271.37.42.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104447" version="1" comment="rpm-devel is &lt;4.4.2-43.38.42.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104448" version="1" comment="rpm-python is &lt;4.4.2-43.38.42.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104449" version="1" comment="rpm is &lt;4.4.2-43.38.42.36" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104450" version="1" comment="xen-devel is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104451" version="1" comment="xen-doc-html is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104452" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104453" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104454" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104455" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104456" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104457" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104458" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104459" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104460" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104461" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104462" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104463" version="1" comment="xen-libs is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104464" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104465" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104466" version="1" comment="xen-tools is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104467" version="1" comment="xen is &lt;3.2.3_17040_28-0.6.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104468" version="1" comment="xen-devel is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104469" version="1" comment="xen-doc-html is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104470" version="1" comment="xen-doc-pdf is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104471" version="1" comment="xen-doc-ps is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104472" version="1" comment="xen-kmp-bigsmp is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104473" version="1" comment="xen-kmp-debug is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104474" version="1" comment="xen-kmp-default is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104475" version="1" comment="xen-kmp-kdump is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104476" version="1" comment="xen-kmp-smp is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104477" version="1" comment="xen-libs-32bit is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104478" version="1" comment="xen-libs is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104479" version="1" comment="xen-tools-domU is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104480" version="1" comment="xen-tools-ioemu is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104481" version="1" comment="xen-tools is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104482" version="1" comment="xen is &lt;3.2.0_16718_26-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074544" version="1" comment="xen-devel is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074545" version="1" comment="xen-doc-html is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074546" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074547" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074548" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074557" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074549" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074558" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074559" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074550" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074560" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074561" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074551" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074552" version="1" comment="xen-libs is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074553" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074554" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074555" version="1" comment="xen-tools is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074556" version="1" comment="xen is &lt;3.2.3_17040_38-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074682" version="1" comment="ImageMagick-Magick++-devel is &lt;6.2.5-16.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074678" version="1" comment="ImageMagick-Magick++ is &lt;6.2.5-16.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074679" version="1" comment="ImageMagick-devel is &lt;6.2.5-16.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074680" version="1" comment="ImageMagick is &lt;6.2.5-16.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074681" version="1" comment="perl-PerlMagick is &lt;6.2.5-16.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074405" version="1" comment="quagga-devel is &lt;0.99.9-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074406" version="1" comment="quagga is &lt;0.99.9-14.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074798" version="1" comment="gnutls-32bit is &lt;1.2.10-13.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074802" version="1" comment="gnutls-64bit is &lt;1.2.10-13.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074799" version="1" comment="gnutls-devel-32bit is &lt;1.2.10-13.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074803" version="1" comment="gnutls-devel-64bit is &lt;1.2.10-13.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074800" version="1" comment="gnutls-devel is &lt;1.2.10-13.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074804" version="1" comment="gnutls-x86 is &lt;1.2.10-13.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074801" version="1" comment="gnutls is &lt;1.2.10-13.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076088" version="1" comment="inst-source-utils is &lt;2008.11.26-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073154" version="1" comment="libvorbis-32bit is &lt;1.1.2-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073157" version="1" comment="libvorbis-64bit is &lt;1.1.2-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073155" version="1" comment="libvorbis-devel is &lt;1.1.2-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073158" version="1" comment="libvorbis-x86 is &lt;1.1.2-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073156" version="1" comment="libvorbis is &lt;1.1.2-13.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073368" version="1" comment="MozillaFirefox-translations is &lt;3.6.28-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073369" version="1" comment="MozillaFirefox is &lt;3.6.28-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073370" version="1" comment="mozilla-nspr-32bit is &lt;4.9.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073383" version="1" comment="mozilla-nspr-64bit is &lt;4.9.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073371" version="1" comment="mozilla-nspr-devel is &lt;4.9.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073384" version="1" comment="mozilla-nspr-x86 is &lt;4.9.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073372" version="1" comment="mozilla-nspr is &lt;4.9.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073373" version="1" comment="mozilla-nss-32bit is &lt;3.13.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073385" version="1" comment="mozilla-nss-64bit is &lt;3.13.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073374" version="1" comment="mozilla-nss-devel is &lt;3.13.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073375" version="1" comment="mozilla-nss-tools is &lt;3.13.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073386" version="1" comment="mozilla-nss-x86 is &lt;3.13.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073376" version="1" comment="mozilla-nss is &lt;3.13.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073377" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.28-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073378" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.28-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073379" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.28-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073380" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.28-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073381" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.28-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073382" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.28-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073387" version="1" comment="MozillaFirefox-branding-upstream is &lt;3.6.28-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075782" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075783" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075784" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075785" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075786" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075787" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075788" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075789" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075790" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075791" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075792" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr11.0-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073110" version="1" comment="cvs-doc is &lt;1.12.12-19.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034801"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073109" version="1" comment="cvs is &lt;1.12.12-19.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040368"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074274" version="1" comment="libxml2-32bit is &lt;2.6.23-15.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074278" version="1" comment="libxml2-64bit is &lt;2.6.23-15.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074275" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074279" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074276" version="1" comment="libxml2-devel is &lt;2.6.23-15.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074280" version="1" comment="libxml2-x86 is &lt;2.6.23-15.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074277" version="1" comment="libxml2 is &lt;2.6.23-15.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104483" version="1" comment="xinetd is &lt;2.3.14-14.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074036" version="1" comment="glibc-32bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074046" version="1" comment="glibc-64bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074037" version="1" comment="glibc-devel-32bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074047" version="1" comment="glibc-devel-64bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074038" version="1" comment="glibc-devel is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074039" version="1" comment="glibc-html is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074040" version="1" comment="glibc-i18ndata is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074041" version="1" comment="glibc-info is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074042" version="1" comment="glibc-locale-32bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074048" version="1" comment="glibc-locale-64bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074049" version="1" comment="glibc-locale-x86 is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074043" version="1" comment="glibc-locale is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074050" version="1" comment="glibc-profile-32bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074051" version="1" comment="glibc-profile-64bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074052" version="1" comment="glibc-profile-x86 is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074053" version="1" comment="glibc-profile is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074054" version="1" comment="glibc-x86 is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074044" version="1" comment="glibc is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074045" version="1" comment="nscd is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074055" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074056" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074057" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074058" version="1" comment="glibc-dceext is &lt;2.4-31.101.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040474"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074397" version="1" comment="postgresql-contrib is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074394" version="1" comment="postgresql-devel is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074398" version="1" comment="postgresql-docs is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074395" version="1" comment="postgresql-libs-32bit is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074399" version="1" comment="postgresql-libs-64bit is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074400" version="1" comment="postgresql-libs-x86 is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074396" version="1" comment="postgresql-libs is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074401" version="1" comment="postgresql-server is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074402" version="1" comment="postgresql is &lt;8.1.22-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073205" version="1" comment="cifs-mount is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073206" version="1" comment="ldapsmb is &lt;1.34b-25.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073218" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073219" version="1" comment="libmsrpc is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073207" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073208" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073209" version="1" comment="libsmbclient is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073210" version="1" comment="samba-32bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073211" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073212" version="1" comment="samba-client is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073213" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073225" version="1" comment="samba-python is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073214" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073215" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073216" version="1" comment="samba-winbind is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073217" version="1" comment="samba is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073220" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073221" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073222" version="1" comment="samba-64bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073223" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073224" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073226" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073227" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073228" version="1" comment="samba-x86 is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073229" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073230" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074693" version="1" comment="expat-32bit is &lt;2.0.0-13.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074695" version="1" comment="expat-64bit is &lt;2.0.0-13.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074696" version="1" comment="expat-x86 is &lt;2.0.0-13.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074694" version="1" comment="expat is &lt;2.0.0-13.15.16" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076727" version="1" comment="apache2-devel is &lt;2.2.3-16.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076728" version="1" comment="apache2-doc is &lt;2.2.3-16.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076729" version="1" comment="apache2-example-pages is &lt;2.2.3-16.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076730" version="1" comment="apache2-prefork is &lt;2.2.3-16.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076731" version="1" comment="apache2-worker is &lt;2.2.3-16.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076732" version="1" comment="apache2 is &lt;2.2.3-16.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074620" version="1" comment="taglib-32bit is &lt;1.4-20.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074623" version="1" comment="taglib-64bit is &lt;1.4-20.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074621" version="1" comment="taglib-devel is &lt;1.4-20.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074624" version="1" comment="taglib-x86 is &lt;1.4-20.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074622" version="1" comment="taglib is &lt;1.4-20.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073550" version="1" comment="freetype2-32bit is &lt;2.1.10-18.29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073555" version="1" comment="freetype2-64bit is &lt;2.1.10-18.29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073551" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073556" version="1" comment="freetype2-devel-64bit is &lt;2.1.10-18.29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073552" version="1" comment="freetype2-devel is &lt;2.1.10-18.29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073557" version="1" comment="freetype2-x86 is &lt;2.1.10-18.29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073553" version="1" comment="freetype2 is &lt;2.1.10-18.29.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073554" version="1" comment="ft2demos is &lt;2.1.10-19.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104484" version="1" comment="freetype2-32bit is &lt;2.1.10-18.29.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104485" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.29.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104486" version="1" comment="freetype2-devel is &lt;2.1.10-18.29.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104487" version="1" comment="freetype2 is &lt;2.1.10-18.29.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104488" version="1" comment="ft2demos is &lt;2.1.10-19.29.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075171" version="1" comment="apache2-mod_python is &lt;3.1.3-60.16.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074785" version="1" comment="perl-DBD-Pg is &lt;1.43-13.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074067" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074068" version="1" comment="php5-bcmath is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074069" version="1" comment="php5-bz2 is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074070" version="1" comment="php5-calendar is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074071" version="1" comment="php5-ctype is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074072" version="1" comment="php5-curl is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074073" version="1" comment="php5-dba is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074074" version="1" comment="php5-dbase is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074075" version="1" comment="php5-devel is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074076" version="1" comment="php5-dom is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074077" version="1" comment="php5-exif is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074078" version="1" comment="php5-fastcgi is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074079" version="1" comment="php5-ftp is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074080" version="1" comment="php5-gd is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074081" version="1" comment="php5-gettext is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074082" version="1" comment="php5-gmp is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074083" version="1" comment="php5-hash is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074084" version="1" comment="php5-iconv is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074085" version="1" comment="php5-imap is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074086" version="1" comment="php5-json is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074087" version="1" comment="php5-ldap is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074088" version="1" comment="php5-mbstring is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074089" version="1" comment="php5-mcrypt is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074090" version="1" comment="php5-mhash is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074091" version="1" comment="php5-mysql is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074092" version="1" comment="php5-ncurses is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074093" version="1" comment="php5-odbc is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074094" version="1" comment="php5-openssl is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074095" version="1" comment="php5-pcntl is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074096" version="1" comment="php5-pdo is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074097" version="1" comment="php5-pear is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074098" version="1" comment="php5-pgsql is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074099" version="1" comment="php5-posix is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074100" version="1" comment="php5-pspell is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074101" version="1" comment="php5-shmop is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074102" version="1" comment="php5-snmp is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074103" version="1" comment="php5-soap is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074104" version="1" comment="php5-sockets is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074105" version="1" comment="php5-sqlite is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074106" version="1" comment="php5-suhosin is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074107" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074108" version="1" comment="php5-sysvsem is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074109" version="1" comment="php5-sysvshm is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074110" version="1" comment="php5-tokenizer is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074111" version="1" comment="php5-wddx is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074112" version="1" comment="php5-xmlreader is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074113" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074114" version="1" comment="php5-xsl is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074115" version="1" comment="php5-zlib is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074116" version="1" comment="php5-tidy is &lt;5.2.14-0.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073804" version="1" comment="libtiff-32bit is &lt;3.8.2-5.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073807" version="1" comment="libtiff-64bit is &lt;3.8.2-5.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073808" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073809" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073805" version="1" comment="libtiff-devel is &lt;3.8.2-5.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073810" version="1" comment="libtiff-x86 is &lt;3.8.2-5.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073806" version="1" comment="libtiff is &lt;3.8.2-5.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104489" version="1" comment="libtiff-32bit is &lt;3.8.2-5.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104490" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104491" version="1" comment="libtiff-devel is &lt;3.8.2-5.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104492" version="1" comment="libtiff is &lt;3.8.2-5.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074701" version="1" comment="finch-devel is &lt;2.6.6-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074698" version="1" comment="finch is &lt;2.6.6-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074702" version="1" comment="libpurple-devel is &lt;2.6.6-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074699" version="1" comment="libpurple is &lt;2.6.6-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074703" version="1" comment="pidgin-devel is &lt;2.6.6-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074700" version="1" comment="pidgin is &lt;2.6.6-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104493" version="1" comment="cifs-mount is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104494" version="1" comment="libmsrpc-devel is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104495" version="1" comment="libmsrpc is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104496" version="1" comment="libsmbclient-32bit is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104497" version="1" comment="libsmbclient-devel is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104498" version="1" comment="libsmbclient is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104499" version="1" comment="samba-32bit is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104500" version="1" comment="samba-client-32bit is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104501" version="1" comment="samba-client is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104502" version="1" comment="samba-doc is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104503" version="1" comment="samba-krb-printing is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104504" version="1" comment="samba-python is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104505" version="1" comment="samba-vscan is &lt;0.3.6b-42.85.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104506" version="1" comment="samba-winbind-32bit is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104507" version="1" comment="samba-winbind is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104508" version="1" comment="samba is &lt;3.0.32-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073646" version="1" comment="cifs-mount is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073647" version="1" comment="ldapsmb is &lt;1.34b-25.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040439"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073660" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073661" version="1" comment="libmsrpc is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073648" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073662" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073649" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073663" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073650" version="1" comment="libsmbclient is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073651" version="1" comment="samba-32bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073664" version="1" comment="samba-64bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073652" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073665" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073666" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073653" version="1" comment="samba-client is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073654" version="1" comment="samba-doc is &lt;3.0.36-0.12.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040440"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073655" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073667" version="1" comment="samba-python is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073656" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040441"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073657" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073668" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073669" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073658" version="1" comment="samba-winbind is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073670" version="1" comment="samba-x86 is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073659" version="1" comment="samba is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073671" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073672" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040438"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074895" version="1" comment="clamav is &lt;0.97.5-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074314" version="1" comment="python-pam is &lt;0.5.0-2.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076107" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076108" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076109" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076110" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076111" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076112" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076113" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076114" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076115" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076116" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076117" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr12.0-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076070" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.14-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076071" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.14-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076072" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.14-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076073" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.14-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076041" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076074" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076042" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076043" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076045" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076046" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076047" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076048" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076049" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076051" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr15.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104509" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104510" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104511" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104512" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104513" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104514" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104515" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104516" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104517" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104518" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.0-0.7.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076826" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076827" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076828" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076829" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076830" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076831" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076832" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076833" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076834" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076835" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076836" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.0-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076550" version="1" comment="cifs-mount is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076551" version="1" comment="ldapsmb is &lt;1.34b-25.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076589" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076590" version="1" comment="libmsrpc is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076552" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076591" version="1" comment="libsmbclient-64bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076553" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076592" version="1" comment="libsmbclient-x86 is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076554" version="1" comment="libsmbclient is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076555" version="1" comment="samba-32bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076593" version="1" comment="samba-64bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076556" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076594" version="1" comment="samba-client-64bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076595" version="1" comment="samba-client-x86 is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076557" version="1" comment="samba-client is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076558" version="1" comment="samba-doc is &lt;3.0.36-0.12.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076559" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076596" version="1" comment="samba-python is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076560" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076561" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076597" version="1" comment="samba-winbind-64bit is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076598" version="1" comment="samba-winbind-x86 is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076562" version="1" comment="samba-winbind is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076599" version="1" comment="samba-x86 is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076563" version="1" comment="samba is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076600" version="1" comment="libsmbsharemodes-devel is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076601" version="1" comment="libsmbsharemodes is &lt;3.0.36-0.13.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031340"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073964" version="1" comment="wireshark-devel is &lt;1.4.12-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009073963" version="1" comment="wireshark is &lt;1.4.12-0.5.6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074662" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074663" version="1" comment="bind-devel-64bit is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074664" version="1" comment="bind-devel is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074665" version="1" comment="bind-doc is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074659" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074666" version="1" comment="bind-libs-64bit is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074667" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074660" version="1" comment="bind-libs is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074661" version="1" comment="bind-utils is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074668" version="1" comment="bind is &lt;9.6ESVR7P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104519" version="1" comment="bind-chrootenv is &lt;9.3.4-1.31.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104520" version="1" comment="bind-devel is &lt;9.3.4-1.31.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104521" version="1" comment="bind-doc is &lt;9.3.4-1.31.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104522" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.31.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104523" version="1" comment="bind-libs is &lt;9.3.4-1.31.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104524" version="1" comment="bind-utils is &lt;9.3.4-1.31.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104525" version="1" comment="bind is &lt;9.3.4-1.31.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104526" version="1" comment="bind-chrootenv is &lt;9.3.4-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104527" version="1" comment="bind-devel is &lt;9.3.4-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104528" version="1" comment="bind-doc is &lt;9.3.4-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104529" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104530" version="1" comment="bind-libs is &lt;9.3.4-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104531" version="1" comment="bind-utils is &lt;9.3.4-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104532" version="1" comment="bind is &lt;9.3.4-1.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075695" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075757" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075696" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075697" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075699" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075700" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075701" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075702" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075703" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075705" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr14.0-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075668" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075669" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075670" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075671" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075001" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.8.25" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075002" version="1" comment="MozillaFirefox-translations is &lt;10.0.6-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075003" version="1" comment="MozillaFirefox is &lt;10.0.6-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075004" version="1" comment="firefox3-gtk2-32bit is &lt;2.10.6-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075005" version="1" comment="firefox3-gtk2 is &lt;2.10.6-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075009" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.6-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075010" version="1" comment="firefox3-gtk2-devel is &lt;2.10.6-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075011" version="1" comment="firefox3-gtk2-doc is &lt;2.10.6-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075519" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.8.31" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075520" version="1" comment="MozillaFirefox-translations is &lt;10.0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075521" version="1" comment="MozillaFirefox is &lt;10.0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075522" version="1" comment="firefox3-cairo-32bit is &lt;1.2.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075523" version="1" comment="firefox3-cairo is &lt;1.2.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075524" version="1" comment="mozilla-nspr-32bit is &lt;4.9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075549" version="1" comment="mozilla-nspr-64bit is &lt;4.9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075525" version="1" comment="mozilla-nspr-devel is &lt;4.9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075550" version="1" comment="mozilla-nspr-x86 is &lt;4.9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075526" version="1" comment="mozilla-nspr is &lt;4.9.2-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075527" version="1" comment="mozilla-nss-32bit is &lt;3.13.6-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075551" version="1" comment="mozilla-nss-64bit is &lt;3.13.6-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075528" version="1" comment="mozilla-nss-devel is &lt;3.13.6-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075529" version="1" comment="mozilla-nss-tools is &lt;3.13.6-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075552" version="1" comment="mozilla-nss-x86 is &lt;3.13.6-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075530" version="1" comment="mozilla-nss is &lt;3.13.6-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075553" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075554" version="1" comment="firefox3-cairo-devel is &lt;1.2.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075555" version="1" comment="firefox3-cairo-doc is &lt;1.2.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074988" version="1" comment="libtiff-32bit is &lt;3.8.2-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074993" version="1" comment="libtiff-64bit is &lt;3.8.2-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074994" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074995" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074989" version="1" comment="libtiff-devel is &lt;3.8.2-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074996" version="1" comment="libtiff-x86 is &lt;3.8.2-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074990" version="1" comment="libtiff is &lt;3.8.2-5.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076170" version="1" comment="ant-trax is &lt;1.6.5-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076171" version="1" comment="ant is &lt;1.6.5-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076172" version="1" comment="ant-apache-oro is &lt;1.6.5-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076173" version="1" comment="ant-apache-regexp is &lt;1.6.5-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076174" version="1" comment="ant-jdepend is &lt;1.6.5-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076175" version="1" comment="ant-junit is &lt;1.6.5-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076176" version="1" comment="ant-nodeps is &lt;1.6.5-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075531" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-13.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075556" version="1" comment="compat-openssl097g-64bit is &lt;0.9.7g-13.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075557" version="1" comment="compat-openssl097g-x86 is &lt;0.9.7g-13.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075532" version="1" comment="compat-openssl097g is &lt;0.9.7g-13.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074282" version="1" comment="openssl-32bit is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074286" version="1" comment="openssl-64bit is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074283" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074287" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074284" version="1" comment="openssl-devel is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074288" version="1" comment="openssl-doc is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074289" version="1" comment="openssl-x86 is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074285" version="1" comment="openssl is &lt;0.9.8a-18.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074955" version="1" comment="net-snmp-32bit is &lt;5.3.0.1-25.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074976" version="1" comment="net-snmp-64bit is &lt;5.3.0.1-25.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074977" version="1" comment="net-snmp-devel-64bit is &lt;5.3.0.1-25.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074956" version="1" comment="net-snmp-devel is &lt;5.3.0.1-25.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074978" version="1" comment="net-snmp-x86 is &lt;5.3.0.1-25.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074957" version="1" comment="net-snmp is &lt;5.3.0.1-25.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074958" version="1" comment="perl-SNMP is &lt;5.3.0.1-25.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074321" version="1" comment="openssl-32bit is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074325" version="1" comment="openssl-64bit is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074322" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074326" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074323" version="1" comment="openssl-devel is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074327" version="1" comment="openssl-doc is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074328" version="1" comment="openssl-x86 is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074324" version="1" comment="openssl is &lt;0.9.8a-18.70.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074452" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074453" version="1" comment="php5-bcmath is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074454" version="1" comment="php5-bz2 is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074455" version="1" comment="php5-calendar is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074456" version="1" comment="php5-ctype is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074457" version="1" comment="php5-curl is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074458" version="1" comment="php5-dba is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074459" version="1" comment="php5-dbase is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074460" version="1" comment="php5-devel is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074461" version="1" comment="php5-dom is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074462" version="1" comment="php5-exif is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074463" version="1" comment="php5-fastcgi is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074464" version="1" comment="php5-ftp is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074465" version="1" comment="php5-gd is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074466" version="1" comment="php5-gettext is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074467" version="1" comment="php5-gmp is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074468" version="1" comment="php5-hash is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074469" version="1" comment="php5-iconv is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074470" version="1" comment="php5-imap is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074471" version="1" comment="php5-json is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074472" version="1" comment="php5-ldap is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074473" version="1" comment="php5-mbstring is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074474" version="1" comment="php5-mcrypt is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074475" version="1" comment="php5-mhash is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074476" version="1" comment="php5-mysql is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074477" version="1" comment="php5-ncurses is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074478" version="1" comment="php5-odbc is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074479" version="1" comment="php5-openssl is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074480" version="1" comment="php5-pcntl is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074481" version="1" comment="php5-pdo is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074482" version="1" comment="php5-pear is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074483" version="1" comment="php5-pgsql is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074484" version="1" comment="php5-posix is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074485" version="1" comment="php5-pspell is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074486" version="1" comment="php5-shmop is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074487" version="1" comment="php5-snmp is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074488" version="1" comment="php5-soap is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074489" version="1" comment="php5-sockets is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074490" version="1" comment="php5-sqlite is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074491" version="1" comment="php5-suhosin is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074492" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074493" version="1" comment="php5-sysvsem is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074494" version="1" comment="php5-sysvshm is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074495" version="1" comment="php5-tokenizer is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074496" version="1" comment="php5-wddx is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074497" version="1" comment="php5-xmlreader is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074498" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074499" version="1" comment="php5-xsl is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074500" version="1" comment="php5-zlib is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074501" version="1" comment="php5-tidy is &lt;5.2.14-0.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074313" version="1" comment="sudo is &lt;1.6.9p23-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107345" version="1" comment="ofed-cxgb3-NIC-kmp-bigsmp is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107346" version="1" comment="ofed-cxgb3-NIC-kmp-debug is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107347" version="1" comment="ofed-cxgb3-NIC-kmp-debug is &lt;1.5.2_2.6.16.60_0.99.38-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107348" version="1" comment="ofed-cxgb3-NIC-kmp-default is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107349" version="1" comment="ofed-cxgb3-NIC-kmp-default is &lt;1.5.2_2.6.16.60_0.99.38-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107350" version="1" comment="ofed-cxgb3-NIC-kmp-kdump is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107351" version="1" comment="ofed-cxgb3-NIC-kmp-kdump is &lt;1.5.2_2.6.16.60_0.99.38-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107352" version="1" comment="ofed-cxgb3-NIC-kmp-kdumppae is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035028"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107353" version="1" comment="ofed-cxgb3-NIC-kmp-ppc64 is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107354" version="1" comment="ofed-cxgb3-NIC-kmp-smp is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107355" version="1" comment="ofed-cxgb3-NIC-kmp-smp is &lt;1.5.2_2.6.16.60_0.99.38-0.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107356" version="1" comment="ofed-cxgb3-NIC-kmp-vmi is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107357" version="1" comment="ofed-cxgb3-NIC-kmp-vmipae is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107358" version="1" comment="ofed-doc is &lt;1.5.2-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107359" version="1" comment="ofed-doc is &lt;1.5.2-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107360" version="1" comment="ofed-kmp-bigsmp is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107361" version="1" comment="ofed-kmp-debug is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107362" version="1" comment="ofed-kmp-debug is &lt;1.5.2_2.6.16.60_0.99.38-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107363" version="1" comment="ofed-kmp-default is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107364" version="1" comment="ofed-kmp-default is &lt;1.5.2_2.6.16.60_0.99.38-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107365" version="1" comment="ofed-kmp-kdump is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107366" version="1" comment="ofed-kmp-kdump is &lt;1.5.2_2.6.16.60_0.99.38-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107367" version="1" comment="ofed-kmp-kdumppae is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107368" version="1" comment="ofed-kmp-ppc64 is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107369" version="1" comment="ofed-kmp-smp is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107370" version="1" comment="ofed-kmp-smp is &lt;1.5.2_2.6.16.60_0.99.38-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107371" version="1" comment="ofed-kmp-vmi is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107372" version="1" comment="ofed-kmp-vmipae is &lt;1.5.2_2.6.16.60_0.99.36-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035038"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107373" version="1" comment="ofed is &lt;1.5.2-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107374" version="1" comment="ofed is &lt;1.5.2-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107375" version="1" comment="ofed-devel is &lt;1.5.2-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044641"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107376" version="1" comment="ofed-devel is &lt;1.5.2-0.14.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074384" version="1" comment="strongswan-doc is &lt;4.4.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074385" version="1" comment="strongswan is &lt;4.4.0-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074788" version="1" comment="wireshark-devel is &lt;1.4.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074787" version="1" comment="wireshark is &lt;1.4.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107378" version="1" comment="xen-devel is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107379" version="1" comment="xen-doc-html is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107380" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107381" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107382" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107391" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107383" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107392" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107393" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107384" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107394" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107395" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107385" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107386" version="1" comment="xen-libs is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107387" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107388" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107389" version="1" comment="xen-tools is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107390" version="1" comment="xen is &lt;3.2.3_17040_40-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075071" version="1" comment="libreoffice-cs is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075073" version="1" comment="libreoffice-de is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075076" version="1" comment="libreoffice-es is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075078" version="1" comment="libreoffice-fr is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075079" version="1" comment="libreoffice-galleries is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075080" version="1" comment="libreoffice-gnome is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075083" version="1" comment="libreoffice-hu is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075084" version="1" comment="libreoffice-it is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075085" version="1" comment="libreoffice-ja is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075086" version="1" comment="libreoffice-kde is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075088" version="1" comment="libreoffice-mono is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075092" version="1" comment="libreoffice-pl is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075093" version="1" comment="libreoffice-pt-BR is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075095" version="1" comment="libreoffice-sk is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075098" version="1" comment="libreoffice-zh-CN is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075099" version="1" comment="libreoffice-zh-TW is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075101" version="1" comment="libreoffice is &lt;3.5.4.7-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074907" version="1" comment="boost-32bit is &lt;1.33.1-17.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074913" version="1" comment="boost-64bit is &lt;1.33.1-17.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074914" version="1" comment="boost-devel-64bit is &lt;1.33.1-17.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074915" version="1" comment="boost-devel is &lt;1.33.1-17.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074916" version="1" comment="boost-doc is &lt;1.33.1-17.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074908" version="1" comment="boost is &lt;1.33.1-17.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075271" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075272" version="1" comment="php5-bcmath is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075273" version="1" comment="php5-bz2 is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075274" version="1" comment="php5-calendar is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075275" version="1" comment="php5-ctype is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075276" version="1" comment="php5-curl is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075277" version="1" comment="php5-dba is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075278" version="1" comment="php5-dbase is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075279" version="1" comment="php5-devel is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075280" version="1" comment="php5-dom is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075281" version="1" comment="php5-exif is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075282" version="1" comment="php5-fastcgi is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075283" version="1" comment="php5-ftp is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075284" version="1" comment="php5-gd is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075285" version="1" comment="php5-gettext is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075286" version="1" comment="php5-gmp is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075287" version="1" comment="php5-hash is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075288" version="1" comment="php5-iconv is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075289" version="1" comment="php5-imap is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075290" version="1" comment="php5-json is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075291" version="1" comment="php5-ldap is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075292" version="1" comment="php5-mbstring is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075293" version="1" comment="php5-mcrypt is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075294" version="1" comment="php5-mhash is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075295" version="1" comment="php5-mysql is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075296" version="1" comment="php5-ncurses is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075297" version="1" comment="php5-odbc is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075298" version="1" comment="php5-openssl is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075299" version="1" comment="php5-pcntl is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075300" version="1" comment="php5-pdo is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075301" version="1" comment="php5-pear is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075302" version="1" comment="php5-pgsql is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075303" version="1" comment="php5-posix is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075304" version="1" comment="php5-pspell is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075305" version="1" comment="php5-shmop is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075306" version="1" comment="php5-snmp is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075307" version="1" comment="php5-soap is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075308" version="1" comment="php5-sockets is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075309" version="1" comment="php5-sqlite is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075310" version="1" comment="php5-suhosin is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075311" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075312" version="1" comment="php5-sysvsem is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075313" version="1" comment="php5-sysvshm is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075314" version="1" comment="php5-tokenizer is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075315" version="1" comment="php5-wddx is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075316" version="1" comment="php5-xmlreader is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075317" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075318" version="1" comment="php5-xsl is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075319" version="1" comment="php5-zlib is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075320" version="1" comment="php5-tidy is &lt;5.2.14-0.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075201" version="1" comment="jpeg is &lt;6b-752.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034966"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075202" version="1" comment="libjpeg-32bit is &lt;6.2.0-752.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075209" version="1" comment="libjpeg-64bit is &lt;6.2.0-752.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075203" version="1" comment="libjpeg-devel-32bit is &lt;6.2.0-18.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075210" version="1" comment="libjpeg-devel-64bit is &lt;6.2.0-18.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075204" version="1" comment="libjpeg-devel is &lt;6.2.0-18.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075211" version="1" comment="libjpeg-x86 is &lt;6.2.0-752.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075205" version="1" comment="libjpeg is &lt;6.2.0-752.8.45" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075509" version="1" comment="libxml2-32bit is &lt;2.6.23-15.33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075513" version="1" comment="libxml2-64bit is &lt;2.6.23-15.33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075510" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075514" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075511" version="1" comment="libxml2-devel is &lt;2.6.23-15.33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075515" version="1" comment="libxml2-x86 is &lt;2.6.23-15.33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075512" version="1" comment="libxml2 is &lt;2.6.23-15.33.17" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075012" version="1" comment="libexif-32bit is &lt;0.6.13-20.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075043" version="1" comment="libexif-64bit is &lt;0.6.13-20.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075044" version="1" comment="libexif-x86 is &lt;0.6.13-20.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075013" version="1" comment="libexif is &lt;0.6.13-20.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075014" version="1" comment="libxslt-32bit is &lt;1.1.15-15.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075045" version="1" comment="libxslt-64bit is &lt;1.1.15-15.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075015" version="1" comment="libxslt-devel-32bit is &lt;1.1.15-15.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075046" version="1" comment="libxslt-devel-64bit is &lt;1.1.15-15.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075016" version="1" comment="libxslt-devel is &lt;1.1.15-15.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075047" version="1" comment="libxslt-x86 is &lt;1.1.15-15.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075017" version="1" comment="libxslt is &lt;1.1.15-15.18.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075516" version="1" comment="nut is &lt;2.0.3-20.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076851" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076852" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076853" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076855" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076856" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076857" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076858" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076859" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076861" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076795" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.15-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076796" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.15-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076797" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.15-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076798" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.15-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076875" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr16.0-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075146" version="1" comment="gimp-devel is &lt;2.2.10-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075147" version="1" comment="gimp is &lt;2.2.10-22.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074979" version="1" comment="finch-devel is &lt;2.6.6-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074959" version="1" comment="finch is &lt;2.6.6-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074980" version="1" comment="libpurple-devel is &lt;2.6.6-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074960" version="1" comment="libpurple is &lt;2.6.6-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074981" version="1" comment="pidgin-devel is &lt;2.6.6-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009074961" version="1" comment="pidgin is &lt;2.6.6-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075102" version="1" comment="libtiff-32bit is &lt;3.8.2-5.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075107" version="1" comment="libtiff-64bit is &lt;3.8.2-5.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075108" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075109" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075103" version="1" comment="libtiff-devel is &lt;3.8.2-5.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075110" version="1" comment="libtiff-x86 is &lt;3.8.2-5.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075104" version="1" comment="libtiff is &lt;3.8.2-5.30.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075425" version="1" comment="gimp-devel is &lt;2.2.10-22.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075426" version="1" comment="gimp is &lt;2.2.10-22.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075266" version="1" comment="gimp-devel is &lt;2.2.10-22.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075267" version="1" comment="gimp is &lt;2.2.10-22.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075172" version="1" comment="bash-x86 is &lt;3.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075154" version="1" comment="bash is &lt;3.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040635"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075155" version="1" comment="readline-32bit is &lt;5.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075173" version="1" comment="readline-64bit is &lt;5.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075156" version="1" comment="readline-devel-32bit is &lt;5.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075174" version="1" comment="readline-devel-64bit is &lt;5.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075157" version="1" comment="readline-devel is &lt;5.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075175" version="1" comment="readline-x86 is &lt;5.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075158" version="1" comment="readline is &lt;5.1-24.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104533" version="1" comment="bash is &lt;3.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104534" version="1" comment="readline-32bit is &lt;5.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104535" version="1" comment="readline-devel-32bit is &lt;5.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104536" version="1" comment="readline-devel is &lt;5.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104537" version="1" comment="readline is &lt;5.1-24.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044255"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075497" version="1" comment="quota is &lt;3.13-17.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076357" version="1" comment="libpcp3 is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035045"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076358" version="1" comment="pcp-import-iostat2pcp is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076359" version="1" comment="pcp-import-mrtg2pcp is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076360" version="1" comment="pcp-import-sar2pcp is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076361" version="1" comment="pcp-import-sheet2pcp is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076362" version="1" comment="pcp is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076363" version="1" comment="perl-PCP-LogImport is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076364" version="1" comment="perl-PCP-LogSummary is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076365" version="1" comment="perl-PCP-MMV is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076366" version="1" comment="perl-PCP-PMDA is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076353" version="1" comment="permissions is &lt;2013.1.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076367" version="1" comment="pcp-devel is &lt;3.6.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075189" version="1" comment="libpng-32bit is &lt;1.2.8-19.37.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075196" version="1" comment="libpng-64bit is &lt;1.2.8-19.37.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075190" version="1" comment="libpng-devel-32bit is &lt;1.2.8-19.37.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075197" version="1" comment="libpng-devel-64bit is &lt;1.2.8-19.37.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075191" version="1" comment="libpng-devel is &lt;1.2.8-19.37.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075198" version="1" comment="libpng-x86 is &lt;1.2.8-19.37.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075192" version="1" comment="libpng is &lt;1.2.8-19.37.24" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077184" version="1" comment="ImageMagick-Magick++-devel is &lt;6.2.5-16.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077155" version="1" comment="ImageMagick-Magick++ is &lt;6.2.5-16.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077156" version="1" comment="ImageMagick-devel is &lt;6.2.5-16.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077157" version="1" comment="ImageMagick is &lt;6.2.5-16.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077158" version="1" comment="perl-PerlMagick is &lt;6.2.5-16.36.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076092" version="1" comment="libotr-devel is &lt;3.0.0-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076090" version="1" comment="libotr is &lt;3.0.0-16.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076207" version="1" comment="glibc-32bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076225" version="1" comment="glibc-64bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076208" version="1" comment="glibc-devel-32bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076226" version="1" comment="glibc-devel-64bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076209" version="1" comment="glibc-devel is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076210" version="1" comment="glibc-html is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076211" version="1" comment="glibc-i18ndata is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076212" version="1" comment="glibc-info is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076213" version="1" comment="glibc-locale-32bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076227" version="1" comment="glibc-locale-64bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076228" version="1" comment="glibc-locale-x86 is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076214" version="1" comment="glibc-locale is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076229" version="1" comment="glibc-profile-32bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076230" version="1" comment="glibc-profile-64bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076231" version="1" comment="glibc-profile-x86 is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076232" version="1" comment="glibc-profile is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076233" version="1" comment="glibc-x86 is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076215" version="1" comment="glibc is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076216" version="1" comment="nscd is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076234" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076235" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076236" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076237" version="1" comment="glibc-dceext is &lt;2.4-31.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104538" version="1" comment="xen-devel is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104539" version="1" comment="xen-doc-html is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104540" version="1" comment="xen-doc-pdf is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104541" version="1" comment="xen-doc-ps is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104542" version="1" comment="xen-kmp-bigsmp is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104543" version="1" comment="xen-kmp-debug is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104544" version="1" comment="xen-kmp-default is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104545" version="1" comment="xen-kmp-kdump is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104546" version="1" comment="xen-kmp-smp is &lt;3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044257"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104547" version="1" comment="xen-libs-32bit is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104548" version="1" comment="xen-libs is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104549" version="1" comment="xen-tools-domU is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104550" version="1" comment="xen-tools-ioemu is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104551" version="1" comment="xen-tools is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104552" version="1" comment="xen is &lt;3.2.0_16718_26-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107408" version="1" comment="xen-devel is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107409" version="1" comment="xen-doc-html is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107410" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107411" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107412" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107413" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107414" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107415" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107416" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107417" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107418" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107419" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107420" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107421" version="1" comment="xen-libs is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107422" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107423" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107424" version="1" comment="xen-tools is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107425" version="1" comment="xen is &lt;3.2.3_17040_28-0.6.13.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107426" version="1" comment="xen-devel is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107427" version="1" comment="xen-devel is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107428" version="1" comment="xen-doc-html is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107429" version="1" comment="xen-doc-html is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107430" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107431" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107432" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107433" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107434" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107450" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107451" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107435" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107436" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107452" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107453" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107454" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107437" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107438" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107455" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107456" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107439" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107440" version="1" comment="xen-libs is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107441" version="1" comment="xen-libs is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107442" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107443" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107444" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107445" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107446" version="1" comment="xen-tools is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107447" version="1" comment="xen-tools is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107448" version="1" comment="xen is &lt;3.2.3_17040_42-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107449" version="1" comment="xen is &lt;3.2.3_17040_42-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077041" version="1" comment="apache2-devel is &lt;2.2.3-16.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077042" version="1" comment="apache2-doc is &lt;2.2.3-16.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077043" version="1" comment="apache2-example-pages is &lt;2.2.3-16.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077044" version="1" comment="apache2-prefork is &lt;2.2.3-16.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077045" version="1" comment="apache2-worker is &lt;2.2.3-16.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077046" version="1" comment="apache2 is &lt;2.2.3-16.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104553" version="1" comment="apache2-devel is &lt;2.2.3-16.32.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104554" version="1" comment="apache2-doc is &lt;2.2.3-16.32.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104555" version="1" comment="apache2-example-pages is &lt;2.2.3-16.32.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104556" version="1" comment="apache2-prefork is &lt;2.2.3-16.32.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104557" version="1" comment="apache2-worker is &lt;2.2.3-16.32.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104558" version="1" comment="apache2 is &lt;2.2.3-16.32.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044258"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075873" version="1" comment="qemu is &lt;0.8.2-37.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040738"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075558" version="1" comment="inn is &lt;2.4.2-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076477" version="1" comment="tomcat5-admin-webapps is &lt;5.5.27-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032157"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076478" version="1" comment="tomcat5-webapps is &lt;5.5.27-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076479" version="1" comment="tomcat5 is &lt;5.5.27-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075216" version="1" comment="dhcp-client is &lt;3.0.7-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075241" version="1" comment="dhcp-devel is &lt;3.0.7-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075242" version="1" comment="dhcp-relay is &lt;3.0.7-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075243" version="1" comment="dhcp-server is &lt;3.0.7-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075217" version="1" comment="dhcp is &lt;3.0.7-7.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075486" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075487" version="1" comment="bind-devel-64bit is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075488" version="1" comment="bind-devel is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075489" version="1" comment="bind-doc is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075483" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075490" version="1" comment="bind-libs-64bit is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075491" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075484" version="1" comment="bind-libs is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075485" version="1" comment="bind-utils is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075492" version="1" comment="bind is &lt;9.6ESVR7P2-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075842" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.8.35" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075843" version="1" comment="MozillaFirefox-translations is &lt;10.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075844" version="1" comment="MozillaFirefox is &lt;10.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075848" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.9-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040730"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075559" version="1" comment="wireshark-devel is &lt;1.4.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075533" version="1" comment="wireshark is &lt;1.4.15-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075887" version="1" comment="MozillaFirefox-translations is &lt;10.0.10-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075888" version="1" comment="MozillaFirefox is &lt;10.0.10-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075889" version="1" comment="mozilla-nspr-32bit is &lt;4.9.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075999" version="1" comment="mozilla-nspr-64bit is &lt;4.9.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075890" version="1" comment="mozilla-nspr-devel is &lt;4.9.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076000" version="1" comment="mozilla-nspr-x86 is &lt;4.9.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075891" version="1" comment="mozilla-nspr is &lt;4.9.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076001" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.10-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076094" version="1" comment="MozillaFirefox-translations is &lt;10.0.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076095" version="1" comment="MozillaFirefox is &lt;10.0.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076096" version="1" comment="mozilla-nss-32bit is &lt;3.14-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076118" version="1" comment="mozilla-nss-64bit is &lt;3.14-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076097" version="1" comment="mozilla-nss-devel is &lt;3.14-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076098" version="1" comment="mozilla-nss-tools is &lt;3.14-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076119" version="1" comment="mozilla-nss-x86 is &lt;3.14-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076099" version="1" comment="mozilla-nss is &lt;3.14-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076120" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.11-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075895" version="1" comment="libreoffice-cs is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075897" version="1" comment="libreoffice-de is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075900" version="1" comment="libreoffice-es is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075902" version="1" comment="libreoffice-fr is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075903" version="1" comment="libreoffice-galleries is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034678"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075904" version="1" comment="libreoffice-gnome is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034098"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075907" version="1" comment="libreoffice-hu is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075908" version="1" comment="libreoffice-it is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075909" version="1" comment="libreoffice-ja is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075910" version="1" comment="libreoffice-kde is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075912" version="1" comment="libreoffice-mono is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075916" version="1" comment="libreoffice-pl is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075917" version="1" comment="libreoffice-pt-BR is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034689"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075919" version="1" comment="libreoffice-sk is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075922" version="1" comment="libreoffice-zh-CN is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034694"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075923" version="1" comment="libreoffice-zh-TW is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034695"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075925" version="1" comment="libreoffice is &lt;3.5.4.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075874" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075875" version="1" comment="bind-devel-64bit is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075876" version="1" comment="bind-devel is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075877" version="1" comment="bind-doc is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075857" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075878" version="1" comment="bind-libs-64bit is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075879" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075858" version="1" comment="bind-libs is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075859" version="1" comment="bind-utils is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075880" version="1" comment="bind is &lt;9.6ESVR7P4-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075682" version="1" comment="bind-chrootenv is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075683" version="1" comment="bind-devel-64bit is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075684" version="1" comment="bind-devel is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075685" version="1" comment="bind-doc is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075676" version="1" comment="bind-libs-32bit is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075686" version="1" comment="bind-libs-64bit is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075687" version="1" comment="bind-libs-x86 is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075677" version="1" comment="bind-libs is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075678" version="1" comment="bind-utils is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075688" version="1" comment="bind is &lt;9.6ESVR7P3-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104559" version="1" comment="bind-chrootenv is &lt;9.3.4-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104560" version="1" comment="bind-devel is &lt;9.3.4-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104561" version="1" comment="bind-doc is &lt;9.3.4-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104562" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104563" version="1" comment="bind-libs is &lt;9.3.4-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104564" version="1" comment="bind-utils is &lt;9.3.4-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104565" version="1" comment="bind is &lt;9.3.4-1.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104566" version="1" comment="bind-chrootenv is &lt;9.3.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104567" version="1" comment="bind-devel is &lt;9.3.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104568" version="1" comment="bind-doc is &lt;9.3.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104569" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104570" version="1" comment="bind-libs is &lt;9.3.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104571" version="1" comment="bind-utils is &lt;9.3.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104572" version="1" comment="bind is &lt;9.3.4-1.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104573" version="1" comment="bind-chrootenv is &lt;9.3.4-1.31.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104574" version="1" comment="bind-devel is &lt;9.3.4-1.31.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104575" version="1" comment="bind-doc is &lt;9.3.4-1.31.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104576" version="1" comment="bind-libs-32bit is &lt;9.3.4-1.31.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104577" version="1" comment="bind-libs is &lt;9.3.4-1.31.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104578" version="1" comment="bind-utils is &lt;9.3.4-1.31.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104579" version="1" comment="bind is &lt;9.3.4-1.31.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075759" version="1" comment="ghostscript-fonts-other is &lt;8.15.4-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075771" version="1" comment="ghostscript-fonts-rus is &lt;8.15.4-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075760" version="1" comment="ghostscript-fonts-std is &lt;8.15.4-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075761" version="1" comment="ghostscript-library is &lt;8.15.4-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075772" version="1" comment="ghostscript-omni is &lt;8.15.4-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075762" version="1" comment="ghostscript-x11 is &lt;8.15.4-16.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075773" version="1" comment="libgimpprint-devel is &lt;4.2.7-62.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009075763" version="1" comment="libgimpprint is &lt;4.2.7-62.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104580" version="1" comment="glibc-32bit is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104581" version="1" comment="glibc-devel-32bit is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104582" version="1" comment="glibc-devel is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104583" version="1" comment="glibc-html is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104584" version="1" comment="glibc-i18ndata is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104585" version="1" comment="glibc-info is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104586" version="1" comment="glibc-locale-32bit is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104587" version="1" comment="glibc-locale is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104588" version="1" comment="glibc-profile-32bit is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104589" version="1" comment="glibc-profile is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104590" version="1" comment="glibc is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104591" version="1" comment="nscd is &lt;2.4-31.77.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104592" version="1" comment="glibc-32bit is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104593" version="1" comment="glibc-devel-32bit is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104594" version="1" comment="glibc-devel is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104595" version="1" comment="glibc-html is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104596" version="1" comment="glibc-i18ndata is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104597" version="1" comment="glibc-info is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104598" version="1" comment="glibc-locale-32bit is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104599" version="1" comment="glibc-locale is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104600" version="1" comment="glibc-profile-32bit is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104601" version="1" comment="glibc-profile is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104602" version="1" comment="glibc is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104603" version="1" comment="nscd is &lt;2.4-31.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077363" version="1" comment="kernel-debug is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077356" version="1" comment="kernel-default is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077364" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077357" version="1" comment="kernel-smp is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077358" version="1" comment="kernel-source is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077359" version="1" comment="kernel-syms is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077360" version="1" comment="kernel-xen is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077361" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077365" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077366" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077367" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077362" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077368" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077369" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076448" version="1" comment="libtiff-32bit is &lt;3.8.2-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076462" version="1" comment="libtiff-64bit is &lt;3.8.2-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076463" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076464" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076449" version="1" comment="libtiff-devel is &lt;3.8.2-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076465" version="1" comment="libtiff-x86 is &lt;3.8.2-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076450" version="1" comment="libtiff is &lt;3.8.2-5.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077027" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077047" version="1" comment="kernel-debug is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077028" version="1" comment="kernel-default is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077048" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077049" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077029" version="1" comment="kernel-smp is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077030" version="1" comment="kernel-source is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077031" version="1" comment="kernel-syms is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077050" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077051" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077032" version="1" comment="kernel-xen is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077033" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077052" version="1" comment="kernel-iseries64 is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077053" version="1" comment="kernel-ppc64 is &lt;2.6.16.60-0.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104604" version="1" comment="xen-devel is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104605" version="1" comment="xen-doc-html is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104606" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104607" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104608" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104609" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104610" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104611" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104612" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104613" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104614" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104615" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104616" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104617" version="1" comment="xen-libs is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104618" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104619" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104620" version="1" comment="xen-tools is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104621" version="1" comment="xen is &lt;3.2.3_17040_28-0.6.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104622" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104623" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104624" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104625" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104626" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104627" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104628" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104629" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104630" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104631" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104632" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104633" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104634" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104635" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104636" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104637" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104638" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104639" version="1" comment="xen is &lt;3.2.3_17040_46-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076919" version="1" comment="openssl-32bit is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076929" version="1" comment="openssl-64bit is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076920" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076930" version="1" comment="openssl-devel-64bit is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076921" version="1" comment="openssl-devel is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076931" version="1" comment="openssl-doc is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076932" version="1" comment="openssl-x86 is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076922" version="1" comment="openssl is &lt;0.9.8a-18.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104640" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104641" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104642" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104643" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104644" version="1" comment="openssl is &lt;0.9.8a-18.45.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076162" version="1" comment="libxml2-32bit is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076177" version="1" comment="libxml2-64bit is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076163" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076178" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076164" version="1" comment="libxml2-devel is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076165" version="1" comment="libxml2-python is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076179" version="1" comment="libxml2-x86 is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076166" version="1" comment="libxml2 is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076180" version="1" comment="libxml2-test is &lt;2.6.23-15.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076124" version="1" comment="xen-devel is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076125" version="1" comment="xen-doc-html is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076126" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076127" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076128" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076139" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076129" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076140" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076141" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076130" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076142" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076143" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076131" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076132" version="1" comment="xen-libs is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076133" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076134" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076135" version="1" comment="xen-tools is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076136" version="1" comment="xen is &lt;3.2.3_17040_44-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076546" version="1" comment="wireshark-devel is &lt;1.6.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076539" version="1" comment="wireshark is &lt;1.6.13-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076564" version="1" comment="squid is &lt;2.5.STABLE12-18.13.982.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076677" version="1" comment="inkscape is &lt;0.43-20.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032044"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076451" version="1" comment="freetype2-32bit is &lt;2.1.10-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076466" version="1" comment="freetype2-64bit is &lt;2.1.10-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076452" version="1" comment="freetype2-devel-32bit is &lt;2.1.10-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076467" version="1" comment="freetype2-devel-64bit is &lt;2.1.10-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031192"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076453" version="1" comment="freetype2-devel is &lt;2.1.10-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076468" version="1" comment="freetype2-x86 is &lt;2.1.10-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076454" version="1" comment="freetype2 is &lt;2.1.10-18.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030613"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076455" version="1" comment="ft2demos is &lt;2.1.10-19.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104645" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.8.46" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104646" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104647" version="1" comment="MozillaFirefox is &lt;10.0.12-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104648" version="1" comment="firefox3-cairo-32bit is &lt;1.2.4-0.8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104649" version="1" comment="firefox3-cairo is &lt;1.2.4-0.8.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104650" version="1" comment="firefox3-gtk2-32bit is &lt;2.10.6-0.12.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104651" version="1" comment="firefox3-gtk2 is &lt;2.10.6-0.12.21" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104652" version="1" comment="firefox3-pango-32bit is &lt;1.14.5-0.12.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104653" version="1" comment="firefox3-pango is &lt;1.14.5-0.12.178" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076320" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076321" version="1" comment="mozilla-nspr-devel is &lt;4.9.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076322" version="1" comment="mozilla-nspr is &lt;4.9.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076323" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076324" version="1" comment="mozilla-nss-devel is &lt;3.14.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076325" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076326" version="1" comment="mozilla-nss is &lt;3.14.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076318" version="1" comment="MozillaFirefox-translations is &lt;10.0.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076319" version="1" comment="MozillaFirefox is &lt;10.0.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076336" version="1" comment="mozilla-nspr-64bit is &lt;4.9.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076337" version="1" comment="mozilla-nspr-x86 is &lt;4.9.4-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076338" version="1" comment="mozilla-nss-64bit is &lt;3.14.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076339" version="1" comment="mozilla-nss-x86 is &lt;3.14.1-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076340" version="1" comment="MozillaFirefox-branding-upstream is &lt;10.0.12-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077109" version="1" comment="wireshark-devel is &lt;1.6.14-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077106" version="1" comment="wireshark is &lt;1.6.14-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077455" version="1" comment="gpg is &lt;1.4.2-23.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104654" version="1" comment="gpg is &lt;1.4.2-23.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077456" version="1" comment="gpg2 is &lt;1.9.18-17.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076701" version="1" comment="nagios-www is &lt;2.6-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076702" version="1" comment="nagios is &lt;2.6-13.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077111" version="1" comment="libxslt-32bit is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077124" version="1" comment="libxslt-64bit is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077112" version="1" comment="libxslt-devel-32bit is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077125" version="1" comment="libxslt-devel-64bit is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077113" version="1" comment="libxslt-devel is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077126" version="1" comment="libxslt-x86 is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077114" version="1" comment="libxslt is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077127" version="1" comment="libxslt-python is &lt;1.1.15-15.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105614" version="1" comment="glibc-32bit is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105615" version="1" comment="glibc-devel-32bit is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105616" version="1" comment="glibc-devel is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105617" version="1" comment="glibc-html is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105618" version="1" comment="glibc-i18ndata is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105619" version="1" comment="glibc-info is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105620" version="1" comment="glibc-locale-32bit is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105621" version="1" comment="glibc-locale is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105622" version="1" comment="glibc-profile-32bit is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105623" version="1" comment="glibc-profile is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105624" version="1" comment="glibc is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105625" version="1" comment="nscd is &lt;2.4-31.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104655" version="1" comment="quagga-devel is &lt;0.99.9-14.17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104656" version="1" comment="quagga is &lt;0.99.9-14.17.12" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077079" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077080" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077081" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077082" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077083" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077084" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077085" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077086" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077087" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077088" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077089" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.1-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076733" version="1" comment="finch-devel is &lt;2.6.6-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076718" version="1" comment="finch is &lt;2.6.6-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031748"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076734" version="1" comment="libpurple-devel is &lt;2.6.6-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076719" version="1" comment="libpurple is &lt;2.6.6-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076735" version="1" comment="pidgin-devel is &lt;2.6.6-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076720" version="1" comment="pidgin is &lt;2.6.6-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077139" version="1" comment="libxml2-32bit is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030809"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077147" version="1" comment="libxml2-64bit is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077140" version="1" comment="libxml2-devel-32bit is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077148" version="1" comment="libxml2-devel-64bit is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077141" version="1" comment="libxml2-devel is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077142" version="1" comment="libxml2-python is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077149" version="1" comment="libxml2-x86 is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077143" version="1" comment="libxml2 is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077150" version="1" comment="libxml2-test is &lt;2.6.23-15.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104657" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104658" version="1" comment="kernel-debug is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104659" version="1" comment="kernel-default is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104660" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104661" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104662" version="1" comment="kernel-smp is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104663" version="1" comment="kernel-source is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104664" version="1" comment="kernel-syms is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104665" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104666" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104667" version="1" comment="kernel-xen is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104668" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077280" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077281" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077282" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077283" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077284" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077285" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077286" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077287" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077288" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077289" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077290" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr13.2-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077398" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077409" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077399" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077400" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077402" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077403" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077404" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077405" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077406" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077408" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077068" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077090" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077069" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077070" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077072" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077073" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077074" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077075" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077076" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077078" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077091" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077092" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077093" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077094" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076862" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.10.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076863" version="1" comment="MozillaFirefox-translations is &lt;17.0.4esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076864" version="1" comment="MozillaFirefox is &lt;17.0.4esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076866" version="1" comment="mozilla-nspr-32bit is &lt;4.9.4-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076876" version="1" comment="mozilla-nspr-64bit is &lt;4.9.4-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076867" version="1" comment="mozilla-nspr-devel is &lt;4.9.4-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076877" version="1" comment="mozilla-nspr-x86 is &lt;4.9.4-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076868" version="1" comment="mozilla-nspr is &lt;4.9.4-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076869" version="1" comment="mozilla-nss-32bit is &lt;3.14.1-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076878" version="1" comment="mozilla-nss-64bit is &lt;3.14.1-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076870" version="1" comment="mozilla-nss-devel is &lt;3.14.1-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076871" version="1" comment="mozilla-nss-tools is &lt;3.14.1-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076879" version="1" comment="mozilla-nss-x86 is &lt;3.14.1-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076872" version="1" comment="mozilla-nss is &lt;3.14.1-0.6.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076880" version="1" comment="MozillaFirefox-branding-upstream is &lt;17.0.4esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076881" version="1" comment="firefox3-python-base is &lt;2.6.8-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076997" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.10.11" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076998" version="1" comment="MozillaFirefox-translations is &lt;17.0.5esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076999" version="1" comment="MozillaFirefox is &lt;17.0.5esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077000" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077017" version="1" comment="mozilla-nspr-64bit is &lt;4.9.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077001" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077018" version="1" comment="mozilla-nspr-x86 is &lt;4.9.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077002" version="1" comment="mozilla-nspr is &lt;4.9.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077003" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077019" version="1" comment="mozilla-nss-64bit is &lt;3.14.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077004" version="1" comment="mozilla-nss-devel is &lt;3.14.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077005" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077020" version="1" comment="mozilla-nss-x86 is &lt;3.14.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077006" version="1" comment="mozilla-nss is &lt;3.14.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077021" version="1" comment="MozillaFirefox-branding-upstream is &lt;17.0.5esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077308" version="1" comment="MozillaFirefox-translations is &lt;17.0.6esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077309" version="1" comment="MozillaFirefox is &lt;17.0.6esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077312" version="1" comment="MozillaFirefox-branding-upstream is &lt;17.0.6esr-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077410" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077411" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077412" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077413" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.17-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077711" version="1" comment="java-1_4_2-ibm-devel is &lt;1.4.2_sr13.18-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077712" version="1" comment="java-1_4_2-ibm-jdbc is &lt;1.4.2_sr13.18-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077713" version="1" comment="java-1_4_2-ibm-plugin is &lt;1.4.2_sr13.18-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077714" version="1" comment="java-1_4_2-ibm is &lt;1.4.2_sr13.18-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077699" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077700" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077701" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077703" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077704" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077705" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077706" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077707" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077709" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077715" version="1" comment="java-1_5_0-ibm-64bit is &lt;1.5.0_sr16.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104669" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104670" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104671" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104672" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104673" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104674" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104675" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104676" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104677" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104678" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr14.0-0.6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077677" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077678" version="1" comment="java-1_6_0-ibm-64bit is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077679" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077680" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077681" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077682" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077683" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077684" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077685" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077686" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077687" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr14.0-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077115" version="1" comment="gnutls-32bit is &lt;1.2.10-13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077128" version="1" comment="gnutls-64bit is &lt;1.2.10-13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077116" version="1" comment="gnutls-devel-32bit is &lt;1.2.10-13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077129" version="1" comment="gnutls-devel-64bit is &lt;1.2.10-13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077117" version="1" comment="gnutls-devel is &lt;1.2.10-13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077130" version="1" comment="gnutls-x86 is &lt;1.2.10-13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077118" version="1" comment="gnutls is &lt;1.2.10-13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077816" version="1" comment="php5-tidy is &lt;5.2.14-0.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077536" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.10.28" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077537" version="1" comment="MozillaFirefox-translations is &lt;17.0.7esr-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077538" version="1" comment="MozillaFirefox is &lt;17.0.7esr-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077549" version="1" comment="MozillaFirefox-branding-upstream is &lt;17.0.7esr-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104679" version="1" comment="MozillaFirefox-branding-SLED is &lt;7-0.10.34" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104680" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104681" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104682" version="1" comment="mozilla-nspr-32bit is &lt;4.9.6-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104683" version="1" comment="mozilla-nspr-devel is &lt;4.9.6-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104684" version="1" comment="mozilla-nspr is &lt;4.9.6-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104685" version="1" comment="mozilla-nss-32bit is &lt;3.14.3-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104686" version="1" comment="mozilla-nss-devel is &lt;3.14.3-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104687" version="1" comment="mozilla-nss-tools is &lt;3.14.3-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104688" version="1" comment="mozilla-nss is &lt;3.14.3-0.5.7" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104689" version="1" comment="MozillaFirefox-translations is &lt;17.0.8esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104690" version="1" comment="MozillaFirefox is &lt;17.0.8esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104691" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104692" version="1" comment="MozillaFirefox-translations is &lt;24.5.0esr-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104693" version="1" comment="MozillaFirefox is &lt;24.5.0esr-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104694" version="1" comment="firefox-atk-32bit is &lt;1.28.0-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104695" version="1" comment="firefox-atk is &lt;1.28.0-0.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104696" version="1" comment="firefox-cairo-32bit is &lt;1.8.0-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104697" version="1" comment="firefox-cairo is &lt;1.8.0-0.10.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104698" version="1" comment="firefox-fontconfig-32bit is &lt;2.6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104699" version="1" comment="firefox-fontconfig is &lt;2.6.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104700" version="1" comment="firefox-freetype2-32bit is &lt;2.3.7-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104701" version="1" comment="firefox-freetype2 is &lt;2.3.7-0.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044288"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104702" version="1" comment="firefox-glib2-32bit is &lt;2.22.5-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104703" version="1" comment="firefox-glib2 is &lt;2.22.5-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104704" version="1" comment="firefox-gtk2-32bit is &lt;2.18.9-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104705" version="1" comment="firefox-gtk2-lang is &lt;2.18.9-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104706" version="1" comment="firefox-gtk2 is &lt;2.18.9-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104707" version="1" comment="firefox-libgcc_s1-32bit is &lt;4.7.2_20130108-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104708" version="1" comment="firefox-libgcc_s1 is &lt;4.7.2_20130108-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104709" version="1" comment="firefox-libstdc++6-32bit is &lt;4.7.2_20130108-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104710" version="1" comment="firefox-libstdc++6 is &lt;4.7.2_20130108-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044291"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104711" version="1" comment="firefox-pango-32bit is &lt;1.26.2-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104712" version="1" comment="firefox-pango is &lt;1.26.2-0.9.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104713" version="1" comment="firefox-pcre-32bit is &lt;7.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104714" version="1" comment="firefox-pcre is &lt;7.8-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104715" version="1" comment="firefox-pixman-32bit is &lt;0.16.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104716" version="1" comment="firefox-pixman is &lt;0.16.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104717" version="1" comment="mozilla-nspr-32bit is &lt;4.10.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104718" version="1" comment="mozilla-nspr-devel is &lt;4.10.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104719" version="1" comment="mozilla-nspr is &lt;4.10.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104720" version="1" comment="mozilla-nss-32bit is &lt;3.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104721" version="1" comment="mozilla-nss-devel is &lt;3.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104722" version="1" comment="mozilla-nss-tools is &lt;3.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104723" version="1" comment="mozilla-nss is &lt;3.16-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104724" version="1" comment="mozilla-xulrunner191-32bit is &lt;1.9.1.19-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104725" version="1" comment="mozilla-xulrunner191-gnomevfs-32bit is &lt;1.9.1.19-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104726" version="1" comment="mozilla-xulrunner191-gnomevfs is &lt;1.9.1.19-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104727" version="1" comment="mozilla-xulrunner191-translations-32bit is &lt;1.9.1.19-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104728" version="1" comment="mozilla-xulrunner191-translations is &lt;1.9.1.19-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104729" version="1" comment="mozilla-xulrunner191 is &lt;1.9.1.19-0.13.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104730" version="1" comment="mozilla-xulrunner192-32bit is &lt;1.9.2.28-0.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104731" version="1" comment="mozilla-xulrunner192-gnome-32bit is &lt;1.9.2.28-0.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104732" version="1" comment="mozilla-xulrunner192-gnome is &lt;1.9.2.28-0.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104733" version="1" comment="mozilla-xulrunner192-translations-32bit is &lt;1.9.2.28-0.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104734" version="1" comment="mozilla-xulrunner192-translations is &lt;1.9.2.28-0.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104735" version="1" comment="mozilla-xulrunner192 is &lt;1.9.2.28-0.13.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104736" version="1" comment="mozilla-nspr-32bit is &lt;4.10.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104737" version="1" comment="mozilla-nspr-devel is &lt;4.10.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104738" version="1" comment="mozilla-nspr is &lt;4.10.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104739" version="1" comment="mozilla-nss-32bit is &lt;3.15.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104740" version="1" comment="mozilla-nss-devel is &lt;3.15.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104741" version="1" comment="mozilla-nss-tools is &lt;3.15.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104742" version="1" comment="mozilla-nss is &lt;3.15.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044300"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104743" version="1" comment="mozilla-nspr-32bit is &lt;4.10.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104744" version="1" comment="mozilla-nspr-devel is &lt;4.10.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104745" version="1" comment="mozilla-nspr is &lt;4.10.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104746" version="1" comment="mozilla-nss-32bit is &lt;3.15.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104747" version="1" comment="mozilla-nss-devel is &lt;3.15.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104748" version="1" comment="mozilla-nss-tools is &lt;3.15.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104749" version="1" comment="mozilla-nss is &lt;3.15.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044302"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104750" version="1" comment="sudo is &lt;1.6.8p12-18.21.8" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077212" version="1" comment="sudo is &lt;1.6.9p23-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076955" version="1" comment="poppler-glib is &lt;0.4.4-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076956" version="1" comment="poppler-qt is &lt;0.4.4-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076957" version="1" comment="poppler is &lt;0.4.4-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009076954" version="1" comment="poppler-devel is &lt;0.4.4-19.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077291" version="1" comment="cvs2svn is &lt;1.3.0-30.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077278" version="1" comment="subversion-devel is &lt;1.3.1-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077292" version="1" comment="subversion-python is &lt;1.3.1-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077293" version="1" comment="subversion-server is &lt;1.3.1-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077294" version="1" comment="subversion-tools is &lt;1.3.1-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077279" version="1" comment="subversion is &lt;1.3.1-1.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077295" version="1" comment="viewcvs is &lt;1.0.5-0.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104751" version="1" comment="apache2-devel is &lt;2.2.3-16.32.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104752" version="1" comment="apache2-doc is &lt;2.2.3-16.32.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104753" version="1" comment="apache2-example-pages is &lt;2.2.3-16.32.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104754" version="1" comment="apache2-prefork is &lt;2.2.3-16.32.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104755" version="1" comment="apache2-worker is &lt;2.2.3-16.32.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104756" version="1" comment="apache2 is &lt;2.2.3-16.32.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104757" version="1" comment="apache2-devel is &lt;2.2.3-16.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104758" version="1" comment="apache2-doc is &lt;2.2.3-16.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104759" version="1" comment="apache2-example-pages is &lt;2.2.3-16.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104760" version="1" comment="apache2-prefork is &lt;2.2.3-16.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104761" version="1" comment="apache2-worker is &lt;2.2.3-16.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104762" version="1" comment="apache2 is &lt;2.2.3-16.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044305"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077625" version="1" comment="ibutils-32bit is &lt;1.5.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033019"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077626" version="1" comment="ibutils-64bit is &lt;1.5.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077627" version="1" comment="ibutils-devel-32bit is &lt;1.5.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077628" version="1" comment="ibutils-devel-64bit is &lt;1.5.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077629" version="1" comment="ibutils-devel is &lt;1.5.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077630" version="1" comment="ibutils-x86 is &lt;1.5.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077631" version="1" comment="ibutils is &lt;1.5.4-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077370" version="1" comment="glibc-32bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077384" version="1" comment="glibc-64bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077371" version="1" comment="glibc-devel-32bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077385" version="1" comment="glibc-devel-64bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077372" version="1" comment="glibc-devel is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077373" version="1" comment="glibc-html is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077374" version="1" comment="glibc-i18ndata is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077375" version="1" comment="glibc-info is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077376" version="1" comment="glibc-locale-32bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077386" version="1" comment="glibc-locale-64bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077387" version="1" comment="glibc-locale-x86 is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077377" version="1" comment="glibc-locale is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077388" version="1" comment="glibc-profile-32bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077389" version="1" comment="glibc-profile-64bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077390" version="1" comment="glibc-profile-x86 is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077391" version="1" comment="glibc-profile is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077392" version="1" comment="glibc-x86 is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077378" version="1" comment="glibc is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077379" version="1" comment="nscd is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077393" version="1" comment="glibc-dceext-32bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077394" version="1" comment="glibc-dceext-64bit is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077395" version="1" comment="glibc-dceext-x86 is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077396" version="1" comment="glibc-dceext is &lt;2.4-31.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104763" version="1" comment="nfs-utils is &lt;1.0.7-36.39.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044306"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077276" version="1" comment="nfs-utils is &lt;1.0.7-36.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077380" version="1" comment="xorg-x11-server is &lt;6.9.0-50.82.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077196" version="1" comment="curl-32bit is &lt;7.15.1-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077204" version="1" comment="curl-64bit is &lt;7.15.1-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077197" version="1" comment="curl-devel is &lt;7.15.1-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077205" version="1" comment="curl-x86 is &lt;7.15.1-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077198" version="1" comment="curl is &lt;7.15.1-19.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077199" version="1" comment="compat-curl2-32bit is &lt;7.11.0-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077206" version="1" comment="compat-curl2-64bit is &lt;7.11.0-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077207" version="1" comment="compat-curl2-x86 is &lt;7.11.0-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077200" version="1" comment="compat-curl2 is &lt;7.11.0-20.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077213" version="1" comment="libtiff-32bit is &lt;3.8.2-5.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077219" version="1" comment="libtiff-64bit is &lt;3.8.2-5.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031106"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077220" version="1" comment="libtiff-devel-32bit is &lt;3.8.2-5.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077221" version="1" comment="libtiff-devel-64bit is &lt;3.8.2-5.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077214" version="1" comment="libtiff-devel is &lt;3.8.2-5.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077222" version="1" comment="libtiff-x86 is &lt;3.8.2-5.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077215" version="1" comment="libtiff is &lt;3.8.2-5.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009040986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077652" version="1" comment="cvs2svn is &lt;1.3.0-30.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077646" version="1" comment="subversion-devel is &lt;1.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077653" version="1" comment="subversion-python is &lt;1.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077654" version="1" comment="subversion-server is &lt;1.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077655" version="1" comment="subversion-tools is &lt;1.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077647" version="1" comment="subversion is &lt;1.3.1-1.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077656" version="1" comment="viewcvs is &lt;1.0.5-0.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077583" version="1" comment="xorg-x11-Xnest is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077584" version="1" comment="xorg-x11-Xvfb is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077585" version="1" comment="xorg-x11-Xvnc is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077586" version="1" comment="xorg-x11-devel-32bit is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077603" version="1" comment="xorg-x11-devel-64bit is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077587" version="1" comment="xorg-x11-devel is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077604" version="1" comment="xorg-x11-doc is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031331"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077588" version="1" comment="xorg-x11-fonts-100dpi is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077589" version="1" comment="xorg-x11-fonts-75dpi is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077590" version="1" comment="xorg-x11-fonts-cyrillic is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077591" version="1" comment="xorg-x11-fonts-scalable is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077592" version="1" comment="xorg-x11-fonts-syriac is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077593" version="1" comment="xorg-x11-libs-32bit is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077605" version="1" comment="xorg-x11-libs-64bit is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077606" version="1" comment="xorg-x11-libs-x86 is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077594" version="1" comment="xorg-x11-libs is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077595" version="1" comment="xorg-x11-man is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077607" version="1" comment="xorg-x11-sdk is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032423"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077596" version="1" comment="xorg-x11-server-glx is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077597" version="1" comment="xorg-x11-server is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077598" version="1" comment="xorg-x11 is &lt;6.9.0-50.84.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077599" version="1" comment="Mesa-32bit is &lt;6.4.2-19.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077608" version="1" comment="Mesa-64bit is &lt;6.4.2-19.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077600" version="1" comment="Mesa-devel-32bit is &lt;6.4.2-19.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077609" version="1" comment="Mesa-devel-64bit is &lt;6.4.2-19.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077601" version="1" comment="Mesa-devel is &lt;6.4.2-19.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077610" version="1" comment="Mesa-x86 is &lt;6.4.2-19.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035171"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077602" version="1" comment="Mesa is &lt;6.4.2-19.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077457" version="1" comment="clamav is &lt;0.97.8-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077539" version="1" comment="openswan is &lt;2.4.4-18.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077458" version="1" comment="gnutls-32bit is &lt;1.2.10-13.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077468" version="1" comment="gnutls-64bit is &lt;1.2.10-13.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077459" version="1" comment="gnutls-devel-32bit is &lt;1.2.10-13.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077469" version="1" comment="gnutls-devel-64bit is &lt;1.2.10-13.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077460" version="1" comment="gnutls-devel is &lt;1.2.10-13.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077470" version="1" comment="gnutls-x86 is &lt;1.2.10-13.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077461" version="1" comment="gnutls is &lt;1.2.10-13.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077558" version="1" comment="compat-curl2-32bit is &lt;7.11.0-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077566" version="1" comment="compat-curl2-64bit is &lt;7.11.0-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077567" version="1" comment="compat-curl2-x86 is &lt;7.11.0-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077559" version="1" comment="compat-curl2 is &lt;7.11.0-20.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077572" version="1" comment="curl-32bit is &lt;7.15.1-19.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077578" version="1" comment="curl-64bit is &lt;7.15.1-19.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077573" version="1" comment="curl-devel is &lt;7.15.1-19.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077579" version="1" comment="curl-x86 is &lt;7.15.1-19.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077574" version="1" comment="curl is &lt;7.15.1-19.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077760" version="1" comment="wireshark-devel is &lt;1.6.16-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077758" version="1" comment="wireshark is &lt;1.6.16-0.5.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077672" version="1" comment="strongswan-doc is &lt;4.4.0-6.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077673" version="1" comment="strongswan is &lt;4.4.0-6.13.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128050" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128051" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128052" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128053" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128054" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128055" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128056" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128057" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128058" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128059" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.25-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108936" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108937" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108938" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108939" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108940" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108941" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108942" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108943" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108944" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108945" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108946" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108947" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108948" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108949" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108950" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108951" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108952" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108953" version="1" comment="xen is &lt;3.2.3_17040_46-0.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104764" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104765" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104766" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104767" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104768" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104769" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104770" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104771" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104772" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.4-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044307"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104773" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104774" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104775" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104776" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104777" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104778" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104779" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104780" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104781" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104782" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.9.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104783" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104784" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104785" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104786" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104787" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104788" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104789" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104790" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104791" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104792" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.0-0.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077734" version="1" comment="ruby-devel is &lt;1.8.6.p369-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077735" version="1" comment="ruby-doc-html is &lt;1.8.6.p369-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077736" version="1" comment="ruby-doc-ri is &lt;1.8.6.p369-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077737" version="1" comment="ruby-examples is &lt;1.8.6.p369-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031430"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077738" version="1" comment="ruby-test-suite is &lt;1.8.6.p369-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077739" version="1" comment="ruby-tk is &lt;1.8.6.p369-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009077721" version="1" comment="ruby is &lt;1.8.6.p369-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009041084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104793" version="1" comment="apache2-mod_php5 is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104794" version="1" comment="php5-bcmath is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104795" version="1" comment="php5-bz2 is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104796" version="1" comment="php5-calendar is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104797" version="1" comment="php5-ctype is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104798" version="1" comment="php5-curl is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104799" version="1" comment="php5-dba is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104800" version="1" comment="php5-dbase is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104801" version="1" comment="php5-devel is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031659"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104802" version="1" comment="php5-dom is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104803" version="1" comment="php5-exif is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104804" version="1" comment="php5-fastcgi is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104805" version="1" comment="php5-ftp is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104806" version="1" comment="php5-gd is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104807" version="1" comment="php5-gettext is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030930"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104808" version="1" comment="php5-gmp is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104809" version="1" comment="php5-hash is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104810" version="1" comment="php5-iconv is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104811" version="1" comment="php5-imap is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031660"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104812" version="1" comment="php5-json is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104813" version="1" comment="php5-ldap is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030935"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104814" version="1" comment="php5-mbstring is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030936"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104815" version="1" comment="php5-mcrypt is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104816" version="1" comment="php5-mhash is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104817" version="1" comment="php5-mysql is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030938"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104818" version="1" comment="php5-ncurses is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104819" version="1" comment="php5-odbc is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104820" version="1" comment="php5-openssl is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104821" version="1" comment="php5-pcntl is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104822" version="1" comment="php5-pdo is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030942"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104823" version="1" comment="php5-pear is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030943"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104824" version="1" comment="php5-pgsql is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104825" version="1" comment="php5-posix is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104826" version="1" comment="php5-pspell is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030945"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104827" version="1" comment="php5-shmop is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104828" version="1" comment="php5-snmp is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030947"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104829" version="1" comment="php5-soap is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104830" version="1" comment="php5-sockets is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104831" version="1" comment="php5-sqlite is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104832" version="1" comment="php5-suhosin is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104833" version="1" comment="php5-sysvmsg is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104834" version="1" comment="php5-sysvsem is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104835" version="1" comment="php5-sysvshm is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030952"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104836" version="1" comment="php5-tokenizer is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104837" version="1" comment="php5-wddx is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104838" version="1" comment="php5-xmlreader is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104839" version="1" comment="php5-xmlrpc is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104840" version="1" comment="php5-xsl is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104841" version="1" comment="php5-zlib is &lt;5.2.14-0.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104842" version="1" comment="strongswan-doc is &lt;4.4.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104843" version="1" comment="strongswan is &lt;4.4.0-6.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104844" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104845" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104846" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104847" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104848" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104849" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104850" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104851" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104852" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.5-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104853" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104854" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104855" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104856" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104857" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104858" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104859" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104860" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104861" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104862" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104863" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104864" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104865" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104866" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104867" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104868" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104869" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104870" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104871" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104872" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr15.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104873" version="1" comment="kernel-bigsmp is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104874" version="1" comment="kernel-debug is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031112"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104875" version="1" comment="kernel-default is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104876" version="1" comment="kernel-kdump is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104877" version="1" comment="kernel-kdumppae is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104878" version="1" comment="kernel-smp is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104879" version="1" comment="kernel-source is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104880" version="1" comment="kernel-syms is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104881" version="1" comment="kernel-vmi is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104882" version="1" comment="kernel-vmipae is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104883" version="1" comment="kernel-xen is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031018"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104884" version="1" comment="kernel-xenpae is &lt;2.6.16.60-0.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104885" version="1" comment="clamav is &lt;0.98.5-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104886" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104887" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104888" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104889" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104890" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104891" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104892" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104893" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104894" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104895" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104896" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104897" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104898" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104899" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104900" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104901" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104902" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104903" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104904" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.0-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044318"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104905" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104906" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104907" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104908" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104909" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104910" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104911" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104912" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104913" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104914" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.0-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107927" version="1" comment="glibc-32bit is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107928" version="1" comment="glibc-devel-32bit is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107929" version="1" comment="glibc-devel is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107930" version="1" comment="glibc-html is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107931" version="1" comment="glibc-i18ndata is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107932" version="1" comment="glibc-info is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107933" version="1" comment="glibc-locale-32bit is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107934" version="1" comment="glibc-locale is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107935" version="1" comment="glibc-profile-32bit is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107936" version="1" comment="glibc-profile is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107937" version="1" comment="glibc is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107938" version="1" comment="nscd is &lt;2.4-31.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104915" version="1" comment="openssl-32bit is &lt;0.9.8a-18.80.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104916" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.80.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104917" version="1" comment="openssl-devel is &lt;0.9.8a-18.80.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104918" version="1" comment="openssl-doc is &lt;0.9.8a-18.80.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104919" version="1" comment="openssl is &lt;0.9.8a-18.80.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104920" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104921" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104922" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104923" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104924" version="1" comment="openssl is &lt;0.9.8a-18.45.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104925" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104926" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104927" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104928" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104929" version="1" comment="openssl is &lt;0.9.8a-18.45.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104930" version="1" comment="openssl-32bit is &lt;0.9.8a-18.82.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104931" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.82.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104932" version="1" comment="openssl-devel is &lt;0.9.8a-18.82.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104933" version="1" comment="openssl-doc is &lt;0.9.8a-18.82.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104934" version="1" comment="openssl is &lt;0.9.8a-18.82.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124424" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124425" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124426" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124427" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124428" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124429" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124430" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124431" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124432" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124433" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124434" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124435" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124436" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124437" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124438" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124439" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124440" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124441" version="1" comment="xen is &lt;3.2.3_17040_46-0.23.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128301" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128302" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128303" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128304" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128305" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128306" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128307" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128308" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128309" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128310" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128311" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128312" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128313" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128314" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128315" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128316" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128317" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009128318" version="1" comment="xen is &lt;3.2.3_17040_46-0.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104935" version="1" comment="MozillaFirefox-branding-SLED is &lt;24-0.12.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104936" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104937" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104938" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104939" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104940" version="1" comment="mozilla-nspr is &lt;4.10.6-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104941" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104942" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104943" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104944" version="1" comment="mozilla-nss is &lt;3.16.1-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104945" version="1" comment="MozillaFirefox-translations is &lt;24.6.0esr-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104946" version="1" comment="MozillaFirefox is &lt;24.6.0esr-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104947" version="1" comment="mozilla-nspr-32bit is &lt;4.10.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104948" version="1" comment="mozilla-nspr-devel is &lt;4.10.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104949" version="1" comment="mozilla-nspr is &lt;4.10.6-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104950" version="1" comment="mozilla-nss-32bit is &lt;3.16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104951" version="1" comment="mozilla-nss-devel is &lt;3.16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104952" version="1" comment="mozilla-nss-tools is &lt;3.16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104953" version="1" comment="mozilla-nss is &lt;3.16.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104954" version="1" comment="MozillaFirefox-translations is &lt;24.7.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104955" version="1" comment="MozillaFirefox is &lt;24.7.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104956" version="1" comment="mozilla-nss-32bit is &lt;3.16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104957" version="1" comment="mozilla-nss-devel is &lt;3.16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104958" version="1" comment="mozilla-nss-tools is &lt;3.16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104959" version="1" comment="mozilla-nss is &lt;3.16.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104960" version="1" comment="MozillaFirefox-translations is &lt;24.8.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104961" version="1" comment="MozillaFirefox is &lt;24.8.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104962" version="1" comment="firefox-gtk2-32bit is &lt;2.18.9-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104963" version="1" comment="firefox-gtk2-lang is &lt;2.18.9-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038329"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104964" version="1" comment="firefox-gtk2 is &lt;2.18.9-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038330"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104965" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104966" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104967" version="1" comment="mozilla-nspr is &lt;4.10.7-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104968" version="1" comment="mozilla-nss-32bit is &lt;3.16.4-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104969" version="1" comment="mozilla-nss-devel is &lt;3.16.4-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104970" version="1" comment="mozilla-nss-tools is &lt;3.16.4-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104971" version="1" comment="mozilla-nss is &lt;3.16.4-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104972" version="1" comment="mozilla-nss-32bit is &lt;3.16.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104973" version="1" comment="mozilla-nss-devel is &lt;3.16.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104974" version="1" comment="mozilla-nss-tools is &lt;3.16.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104975" version="1" comment="mozilla-nss is &lt;3.16.5-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105646" version="1" comment="MozillaFirefox-translations is &lt;31.4.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105647" version="1" comment="MozillaFirefox is &lt;31.4.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105648" version="1" comment="mozilla-nss-32bit is &lt;3.17.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105649" version="1" comment="mozilla-nss-devel is &lt;3.17.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105650" version="1" comment="mozilla-nss-tools is &lt;3.17.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105651" version="1" comment="mozilla-nss is &lt;3.17.3-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104976" version="1" comment="MozillaFirefox-branding-SLED is &lt;31.0-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104977" version="1" comment="MozillaFirefox-translations is &lt;31.2.0esr-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104978" version="1" comment="MozillaFirefox is &lt;31.2.0esr-0.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104979" version="1" comment="mozilla-nspr-32bit is &lt;4.10.7-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104980" version="1" comment="mozilla-nspr-devel is &lt;4.10.7-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104981" version="1" comment="mozilla-nspr is &lt;4.10.7-0.5.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044340"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104982" version="1" comment="mozilla-nss-32bit is &lt;3.17.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104983" version="1" comment="mozilla-nss-devel is &lt;3.17.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104984" version="1" comment="mozilla-nss-tools is &lt;3.17.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104985" version="1" comment="mozilla-nss is &lt;3.17.2-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044341"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104986" version="1" comment="MozillaFirefox-translations is &lt;31.3.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104987" version="1" comment="MozillaFirefox is &lt;31.3.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044342"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104988" version="1" comment="strongswan-doc is &lt;4.4.0-6.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104989" version="1" comment="strongswan is &lt;4.4.0-6.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044343"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104990" version="1" comment="strongswan-doc is &lt;4.1.10-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104991" version="1" comment="strongswan is &lt;4.1.10-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111116" version="1" comment="strongswan-doc is &lt;4.4.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111117" version="1" comment="strongswan is &lt;4.4.0-6.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106826" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106827" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106828" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106829" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106830" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106831" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106832" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106833" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106834" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.9-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106307" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106308" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106309" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106310" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106311" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106312" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106313" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106314" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106315" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106316" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.3-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104992" version="1" comment="gnutls-32bit is &lt;1.2.10-13.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104993" version="1" comment="gnutls-devel-32bit is &lt;1.2.10-13.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104994" version="1" comment="gnutls-devel is &lt;1.2.10-13.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104995" version="1" comment="gnutls is &lt;1.2.10-13.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104996" version="1" comment="openssl-32bit is &lt;0.9.8a-18.84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104997" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104998" version="1" comment="openssl-devel is &lt;0.9.8a-18.84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009104999" version="1" comment="openssl-doc is &lt;0.9.8a-18.84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105000" version="1" comment="openssl is &lt;0.9.8a-18.84.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105001" version="1" comment="openssl-32bit is &lt;0.9.8a-18.45.79.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105002" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.45.79.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105003" version="1" comment="openssl-devel is &lt;0.9.8a-18.45.79.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105004" version="1" comment="openssl-doc is &lt;0.9.8a-18.45.79.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105005" version="1" comment="openssl is &lt;0.9.8a-18.45.79.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105006" version="1" comment="openssl-32bit is &lt;0.9.8a-18.86.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105007" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.86.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105008" version="1" comment="openssl-devel is &lt;0.9.8a-18.86.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105009" version="1" comment="openssl-doc is &lt;0.9.8a-18.86.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105010" version="1" comment="openssl is &lt;0.9.8a-18.86.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105673" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-13.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105674" version="1" comment="compat-openssl097g is &lt;0.9.7g-13.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105652" version="1" comment="openssl-32bit is &lt;0.9.8a-18.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105653" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105654" version="1" comment="openssl-devel is &lt;0.9.8a-18.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105655" version="1" comment="openssl-doc is &lt;0.9.8a-18.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105656" version="1" comment="openssl is &lt;0.9.8a-18.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105011" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105012" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105013" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105014" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105015" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105016" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105017" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105018" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105019" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105020" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105021" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105022" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105023" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105024" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105025" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105026" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105027" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105028" version="1" comment="xen is &lt;3.2.3_17040_46-0.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105029" version="1" comment="lzo-32bit is &lt;2.02-12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105030" version="1" comment="lzo-devel-32bit is &lt;2.02-12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105031" version="1" comment="lzo-devel is &lt;2.02-12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105032" version="1" comment="lzo is &lt;2.02-12.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105033" version="1" comment="wget is &lt;1.10.2-15.14.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105034" version="1" comment="bash is &lt;3.1-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105035" version="1" comment="readline-32bit is &lt;5.1-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105036" version="1" comment="readline-devel-32bit is &lt;5.1-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105037" version="1" comment="readline-devel is &lt;5.1-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105038" version="1" comment="readline is &lt;5.1-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107658" version="1" comment="bind-chrootenv is &lt;9.6ESVR11P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107659" version="1" comment="bind-devel is &lt;9.6ESVR11P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107660" version="1" comment="bind-doc is &lt;9.6ESVR11P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107661" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107662" version="1" comment="bind-libs is &lt;9.6ESVR11P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107663" version="1" comment="bind-utils is &lt;9.6ESVR11P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107664" version="1" comment="bind is &lt;9.6ESVR11P1-0.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106174" version="1" comment="xntp-doc is &lt;4.2.4p3-48.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009106175" version="1" comment="xntp is &lt;4.2.4p3-48.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105039" version="1" comment="xntp-doc is &lt;4.2.4p3-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105040" version="1" comment="xntp is &lt;4.2.4p3-48.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107555" version="1" comment="clamav is &lt;0.98.6-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110582" version="1" comment="java-1_5_0-ibm-32bit is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110583" version="1" comment="java-1_5_0-ibm-alsa-32bit is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110584" version="1" comment="java-1_5_0-ibm-alsa is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110585" version="1" comment="java-1_5_0-ibm-devel-32bit is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110586" version="1" comment="java-1_5_0-ibm-devel is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110587" version="1" comment="java-1_5_0-ibm-fonts is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032773"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110588" version="1" comment="java-1_5_0-ibm-jdbc is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110589" version="1" comment="java-1_5_0-ibm-plugin is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110590" version="1" comment="java-1_5_0-ibm is &lt;1.5.0_sr16.10-0.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110669" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110670" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110671" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110672" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110673" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110674" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110675" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110676" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110677" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110678" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.4-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121450" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121451" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121452" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121453" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121454" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121455" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121456" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121457" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121458" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121459" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.15-0.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107945" version="1" comment="openssl-32bit is &lt;0.9.8a-18.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107946" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107947" version="1" comment="openssl-devel is &lt;0.9.8a-18.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107948" version="1" comment="openssl-doc is &lt;0.9.8a-18.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107949" version="1" comment="openssl is &lt;0.9.8a-18.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105525" version="1" comment="glibc-32bit is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105526" version="1" comment="glibc-devel-32bit is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105527" version="1" comment="glibc-devel is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105528" version="1" comment="glibc-html is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105529" version="1" comment="glibc-i18ndata is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105530" version="1" comment="glibc-info is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105531" version="1" comment="glibc-locale-32bit is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105532" version="1" comment="glibc-locale is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105533" version="1" comment="glibc-profile-32bit is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105534" version="1" comment="glibc-profile is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105535" version="1" comment="glibc is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105536" version="1" comment="nscd is &lt;2.4-31.113.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107950" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-13.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107951" version="1" comment="compat-openssl097g is &lt;0.9.7g-13.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124472" version="1" comment="openssl-32bit is &lt;0.9.8a-18.94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124473" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124474" version="1" comment="openssl-devel is &lt;0.9.8a-18.94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124475" version="1" comment="openssl-doc is &lt;0.9.8a-18.94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124476" version="1" comment="openssl is &lt;0.9.8a-18.94.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108154" version="1" comment="MozillaFirefox-translations is &lt;31.5.3esr-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108155" version="1" comment="MozillaFirefox is &lt;31.5.3esr-0.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107221" version="1" comment="MozillaFirefox-translations is &lt;31.5.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009107222" version="1" comment="MozillaFirefox is &lt;31.5.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110868" version="1" comment="openssl-32bit is &lt;0.9.8a-18.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110869" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110870" version="1" comment="openssl-devel is &lt;0.9.8a-18.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110871" version="1" comment="openssl-doc is &lt;0.9.8a-18.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110872" version="1" comment="openssl is &lt;0.9.8a-18.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110874" version="1" comment="compat-openssl097g-32bit is &lt;0.9.7g-13.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110875" version="1" comment="compat-openssl097g is &lt;0.9.7g-13.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130928" version="1" comment="yast2-ntp-client is &lt;2.13.18-0.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130726" version="1" comment="ntp-doc is &lt;4.2.8p8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009130727" version="1" comment="ntp is &lt;4.2.8p8-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114712" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114713" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114714" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114715" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114716" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114717" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114718" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114719" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114720" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114721" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114722" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114723" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114724" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114725" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114726" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114727" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114728" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114729" version="1" comment="xen is &lt;3.2.3_17040_46-0.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111041" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111042" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111043" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111044" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111045" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111046" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111047" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111048" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111049" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111050" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111051" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111052" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111053" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111054" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111055" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111056" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111057" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111058" version="1" comment="xen is &lt;3.2.3_17040_46-0.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109887" version="1" comment="xen-devel is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109888" version="1" comment="xen-doc-html is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109889" version="1" comment="xen-doc-pdf is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109890" version="1" comment="xen-doc-ps is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109891" version="1" comment="xen-kmp-bigsmp is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109892" version="1" comment="xen-kmp-debug is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109893" version="1" comment="xen-kmp-default is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109894" version="1" comment="xen-kmp-kdump is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109895" version="1" comment="xen-kmp-kdumppae is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109896" version="1" comment="xen-kmp-smp is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109897" version="1" comment="xen-kmp-vmi is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109898" version="1" comment="xen-kmp-vmipae is &lt;3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109899" version="1" comment="xen-libs-32bit is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109900" version="1" comment="xen-libs is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109901" version="1" comment="xen-tools-domU is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031483"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109902" version="1" comment="xen-tools-ioemu is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109903" version="1" comment="xen-tools is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009109904" version="1" comment="xen is &lt;3.2.3_17040_46-0.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118077" version="1" comment="MozillaFirefox-branding-SLED is &lt;38-0.5.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033270"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118078" version="1" comment="MozillaFirefox-translations is &lt;38.4.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118079" version="1" comment="MozillaFirefox is &lt;38.4.0esr-0.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046385"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118080" version="1" comment="mozilla-nspr-32bit is &lt;4.10.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118081" version="1" comment="mozilla-nspr-devel is &lt;4.10.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118082" version="1" comment="mozilla-nspr is &lt;4.10.10-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118083" version="1" comment="mozilla-nss-32bit is &lt;3.19.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118084" version="1" comment="mozilla-nss-devel is &lt;3.19.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118085" version="1" comment="mozilla-nss-tools is &lt;3.19.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118086" version="1" comment="mozilla-nss is &lt;3.19.2.1-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124789" version="1" comment="java-1_6_0-ibm-32bit is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034053"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124790" version="1" comment="java-1_6_0-ibm-alsa-32bit is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124791" version="1" comment="java-1_6_0-ibm-alsa is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124792" version="1" comment="java-1_6_0-ibm-devel-32bit is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124793" version="1" comment="java-1_6_0-ibm-devel is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124794" version="1" comment="java-1_6_0-ibm-fonts is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124795" version="1" comment="java-1_6_0-ibm-jdbc is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124796" version="1" comment="java-1_6_0-ibm-plugin-32bit is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124797" version="1" comment="java-1_6_0-ibm-plugin is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009124798" version="1" comment="java-1_6_0-ibm is &lt;1.6.0_sr16.20-0.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047256"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126519" version="1" comment="cifs-mount is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126520" version="1" comment="ldapsmb is &lt;1.34b-25.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126521" version="1" comment="libmsrpc-devel is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126522" version="1" comment="libmsrpc is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126523" version="1" comment="libsmbclient-32bit is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126524" version="1" comment="libsmbclient-devel is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126525" version="1" comment="libsmbclient is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126526" version="1" comment="samba-32bit is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126527" version="1" comment="samba-client-32bit is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126528" version="1" comment="samba-client is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126529" version="1" comment="samba-doc is &lt;3.0.36-0.12.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126530" version="1" comment="samba-krb-printing is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126531" version="1" comment="samba-python is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126532" version="1" comment="samba-vscan is &lt;0.3.6b-43.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126533" version="1" comment="samba-winbind-32bit is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030771"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126534" version="1" comment="samba-winbind is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009126535" version="1" comment="samba is &lt;3.0.36-0.13.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122110" version="1" comment="bind-chrootenv is &lt;9.6ESVR11P1-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122111" version="1" comment="bind-devel is &lt;9.6ESVR11P1-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122112" version="1" comment="bind-doc is &lt;9.6ESVR11P1-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122113" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11P1-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122114" version="1" comment="bind-libs is &lt;9.6ESVR11P1-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122115" version="1" comment="bind-utils is &lt;9.6ESVR11P1-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009122116" version="1" comment="bind is &lt;9.6ESVR11P1-0.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111533" version="1" comment="bind-chrootenv is &lt;9.6ESVR11P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111534" version="1" comment="bind-devel is &lt;9.6ESVR11P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111535" version="1" comment="bind-doc is &lt;9.6ESVR11P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111536" version="1" comment="bind-libs-32bit is &lt;9.6ESVR11P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031555"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111537" version="1" comment="bind-libs is &lt;9.6ESVR11P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111538" version="1" comment="bind-utils is &lt;9.6ESVR11P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009111539" version="1" comment="bind is &lt;9.6ESVR11P1-0.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127917" version="1" comment="openssl-32bit is &lt;0.9.8a-18.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127918" version="1" comment="openssl-devel-32bit is &lt;0.9.8a-18.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127919" version="1" comment="openssl-devel is &lt;0.9.8a-18.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127920" version="1" comment="openssl-doc is &lt;0.9.8a-18.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127921" version="1" comment="openssl is &lt;0.9.8a-18.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125144" version="1" comment="MozillaFirefox-translations is &lt;38.7.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125145" version="1" comment="MozillaFirefox is &lt;38.7.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125146" version="1" comment="mozilla-nspr-32bit is &lt;4.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125147" version="1" comment="mozilla-nspr-devel is &lt;4.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125148" version="1" comment="mozilla-nspr is &lt;4.12-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125149" version="1" comment="mozilla-nss-32bit is &lt;3.20.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125150" version="1" comment="mozilla-nss-devel is &lt;3.20.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125151" version="1" comment="mozilla-nss-tools is &lt;3.20.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125152" version="1" comment="mozilla-nss is &lt;3.20.2-0.7.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127855" version="1" comment="MozillaFirefox-translations is &lt;38.8.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009127856" version="1" comment="MozillaFirefox is &lt;38.8.0esr-0.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047576"/>
	</rpminfo_test>
 </tests>
 <objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sles-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-apps-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cifs-mount</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-relay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-base-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-base-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-base-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-base-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbeagle-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbeagle-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbeagle-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libbeagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgail-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdiplus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmsrpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmsrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbclient</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-krb-printing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-pdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-vscan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-suhosin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat5-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat5-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-smp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slert-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ib-bonding-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ib-bonding-kmp-rt_bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ib-bonding-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ib-bonding-kmp-rt_timing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt_timing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-rt_bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-rt_timing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt_bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt_debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-rt_timing</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kdumppae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-vmipae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-xenpae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-iseries64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sap-aio-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios-www</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nagios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sled-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>LibVNCServer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-gmcop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>esound-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>esound-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>esound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>esound-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>esound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fileshareset</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-kdm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-ksysguardd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-nsplugin64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-nsplugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-session</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-arts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdelibs3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeutils3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeutils3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeutils3-laptop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdeutils3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwnck</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-Max</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-shared</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-extensions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-mysql-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-postgresql-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-unixODBC-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-unixODBC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>device-mapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfxboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lkcdutils-netdump-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lkcdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ltrace-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ltrace-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ltrace</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysstat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat-cmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat-ldirectord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat-pils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat-stonith</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>heartbeat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2console</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>control-center2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>control-center2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eel-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-data-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-applets-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-applets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-cups-manager-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-cups-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-keyring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-main-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-menus-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-menus-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-menus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-menus-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-menus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-nld-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-nld-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-nld-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-nld-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-panel-nld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-vfs2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gtkhtml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomedb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomedb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomesu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomeui-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomeui-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomeui-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomeui-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomeui-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnomeui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nspr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nautilus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vte</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenIPMI</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bootsplash-theme-SuSE-SLES</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ddrescue</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipmitool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ivman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksh-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ksh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nscd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>release-notes-sles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>timezone</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xnest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-fonts-100dpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-fonts-75dpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-fonts-cyrillic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-fonts-scalable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-fonts-syriac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-glx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-example-pages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dbase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-filepro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-imap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mhash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-mysqli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pear</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-pspell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-wddx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dejavu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-data-NLD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmotif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-ident</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-libsax-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-libsax-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-libsax-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-libsax-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-libsax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sax2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tightvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xdg-menu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-driver-video-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-driver-video</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-control-center</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>CheckHardware</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aaa_base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>acl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>at</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>attr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autofs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoyast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-chrootenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coreutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpio</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cron</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>desktop-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>diffutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dmraid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dosfstools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>e2fsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>filesystem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils-locate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>findutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grep</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwinfo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hwinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>insserv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iputils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>klogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapcpplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapcpplib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libacl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libattr-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libattr-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libattr-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libattr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libattr-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libattr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcom_err</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liby2util-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liby2util</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp-zmd-backend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libzypp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lilo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>limal-bootloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>limal-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>limal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mcelog</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mdadm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>microcode_ctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mkinitrd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>module-init-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>multipath-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfs-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nfsidmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-back-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openldap2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parted-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parted-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parted-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parted-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>parted</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pciutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pciutils-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pciutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pciutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcsc-lite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Bootloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>permissions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>popt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>portmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postfix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>powersave</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>procinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>reiserfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>scpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>screen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sudo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>suseRegister</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysfsutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysfsutils-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysfsutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysfsutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>syslogd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sysvinit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>terminfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ulimit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>update-desktop-files</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>util-linux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireless-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xfsprogs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xntp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-backup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-bootloader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-country</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-firewall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-hardware-detection</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-inetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-installation</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-irda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-kerberos-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ldap-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-mail-aliases</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-mail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ncurses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-nfs-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-nis-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-ntp-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-online-update-frontend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-online-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-packager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-perl-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-pkg-bindings</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-power-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-powertweak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-printer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-profile-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-repair</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-restore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-runlevel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-schema</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-security</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-slp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-evms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-sysconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-theme-NLD</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-trans-stats</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-transfer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-tune</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-users</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-vm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yast2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zmd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zmd-inventory</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zypper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nss_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam_ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>NetworkManager-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-IRC</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-InstantMessenger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-dialup</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-lan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-lisa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-news</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-query</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3-wireless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdenetwork3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim3-kpilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim3-networkstatus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim3-sync</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim3-time-management</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdepim3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kinternet</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lynx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wpa_supplicant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-hash</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-json</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ib-bonding-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>oracleasm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_4_2-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>slepos-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-rus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-omni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gecko-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mailman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php5-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-Magick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-Magick++</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmbsharemodes</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-doc-ri</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-test-suite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ruby</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs2svn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>subversion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>viewcvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xgl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>clamav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-dceext-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-dceext-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-dceext-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-dceext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-cgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>namazu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>speex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vorbis-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xine-ui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdesktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>emacs-nox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mtr-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mtr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bluez-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vsftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_auth_mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>imlib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>finch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpurple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pidgin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ethereal-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bytefx-data-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibm-data-db2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-basic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-firebird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-oracle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data-sybase</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-jscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-locale-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-nunit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mono-winforms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>novell-ipsec-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-1_14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-activerecord</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper-kmp-smp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ndiswrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz-tcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>graphviz</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dapl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ib-bonding</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibvexdmtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>infiniband-diags</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcxgb3-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcxgb3-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcxgb3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcxgb3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdmacm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdmacm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdmacm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdmacm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpi-selector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpitests-mvapich2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpitests-mvapich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpitests-openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpitests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mstflint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mvapich</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openmpi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opensm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perftest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qlvnictools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valgrind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-openssl097g</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-1_12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rubygem-actionpack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>epiphany</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netatalk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>audiofile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner191-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xpcom191</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eID-belgium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-libvisual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok-xine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amarok</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-kamera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-scan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>icu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-galleries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenOffice_org</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-DBD-Pg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zope</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>zope3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-otp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-sasl-sqlauxprop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xpcom190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-gnomevfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner190</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qt3support-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qt3support-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qt3support-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-qt3support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-sql-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-sql-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-sql-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-sql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-x11-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-x11-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-x11-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dbus-1-qt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-fax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3-postscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdegraphics3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-alsa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pango-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwmf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gaim-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gaim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quagga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>OpenEXR-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Xerces-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer010-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-nss-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>neon-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr-util1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libapr1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_5_0-ibm-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ethereal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicecore-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicecore</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiiclib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiiclib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiksemel-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libiksemel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetlib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlrpc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxmlrpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-apis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-dom3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-impl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-javadoc-xni</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xerces-j2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-gdbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-xml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cyrus-imapd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-IMAP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-Cyrus-SIEVE-managesieve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-atk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-atk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-cairo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-cairo-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-gtk2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-gtk2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-el</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xemacs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldapsmb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnewt0_52</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>newt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-SLED</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeradius</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfuse2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-fonts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-jdbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-plugin-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-1_6_0-ibm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pyxml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xpdf-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-glib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-libs-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-HTML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-fonts-std</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-library</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ghostscript-x11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmikmod</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>netpbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnetpbm-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sendmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uucp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsndfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gzip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_cml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_mysql_vhost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_rrdtool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_trigger_b4_dl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd-mod_webdav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lighttpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bzip2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kdebase3-beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_ams</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_cont</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_dvilj</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_eplai</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_kpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_latex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_mpost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_omega</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_ptex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>te_web</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tetex</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>iscsitarget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ncpfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozilla-xulrunner192-translations</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ft2demos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m-inline-image</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>w3m</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>evince</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>socat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-cs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-de-templates</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-de</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-es</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-fr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-galleries</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-hu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-it</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-ja</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-kde</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-mono</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-pt-BR</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-sk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-zh-CN</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice-zh-TW</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libreoffice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-american</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-brazilian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-british</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-catalan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-czech</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-danish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-dutch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-french</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-german</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-greek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-gujarati</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-hindi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-italian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-lithuanian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-marathi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-norsk-bokmaal</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-polish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-portuguese</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-russian</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-slovak</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-slovene</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-spanish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-swedish</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>myspell-xhosa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloop-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpint-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>drbd-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lirc-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openslp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>supportutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virt-manager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-pdf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-doc-ps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-kdumppae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-smp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-kmp-vmipae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-domU</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools-ioemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libicu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pure-ftpd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-kdumppae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-smp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-cxgb3-NIC-kmp-vmipae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-bigsmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-kdumppae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-ppc64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-smp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-vmi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-kmp-vmipae</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ofed-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>t1lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcpcd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dhcp6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logwatch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-evolution</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-firefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle-gui</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>beagle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-autoconf261</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-make</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-python-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yasm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>yasm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxcrypt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pwdutils-plugin-audit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>opie</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vpnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>foomatic-filters</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssapi-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssapi-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssapi-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgssapi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>radvd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inst-source-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvorbis-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cvs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xinetd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>taglib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-pam</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox3-cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-trax</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-oro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-apache-regexp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-jdepend</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-junit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ant-nodeps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>boost-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>quota</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcp3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-iostat2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-mrtg2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sar2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-import-sheet2pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogImport</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-LogSummary</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-MMV</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PCP-PMDA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pcp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libotr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>inkscape</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-atk-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-atk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-cairo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-cairo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-fontconfig</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-freetype2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-freetype2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-glib2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-gtk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgcc_s1-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libgcc_s1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libstdc++6-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-libstdc++6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pango-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pango</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pcre-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pcre</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pixman-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>firefox-pixman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ibutils-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-curl2-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-curl2-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-curl2-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>compat-curl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035171" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>Mesa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel-32bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lzo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ntp</name>
	</rpminfo_object>
 </objects>
 <states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">10</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.49.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.11-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.4-60.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-12.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.24-2.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-23.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.6-12.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.6-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1-261.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009032999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.5-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.16.3-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-41.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-13.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-42.49</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1.2-29.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-27.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0_2.6.22.19_0.35-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.35-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-0.33.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.35-0.33.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-31.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.1-15.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.36-19.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-84.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.94-18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-907.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009033391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-69.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-49.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-49.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-25.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.0.1-25.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.5-58.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.5-58.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.02.13-6.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.38-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.46-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.0.1-22.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4-31.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-36.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.0.2-16.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.22-42.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.8-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.3-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-19.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.2-27.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.2-18.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-43.53</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.2-51.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.32cvs20060120-33.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.2-25.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.6-18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.1-38.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.3-0.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.2-58.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.4-11.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.10.0-15.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.91-23.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-32.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.1-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13.99-13.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.90-18.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.6.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.2-64.33</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.11.17-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.7-35.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-69.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.13_0.0.6-1.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97-16.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.9-2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.9-16.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:93r-12.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02.17-7.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-43.51</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-15.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0.2-2.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1-31.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11.4-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-21.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-125.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-125.38</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1-125.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7-125.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9-201.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-66.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-46.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.10-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.82-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.13-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1-988.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-12.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.41-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.8-921.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.34-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4-23.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.95-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-24.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.16.91.0.5-23.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.93-22.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-19.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-45.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1-40.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.7-17.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99_1.0.0rc13-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11-15.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.38-25.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.27-14.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.1a-20.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.6-33.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:12.46-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.04.0-20.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:ss021109-167.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-559.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.4-14.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.8-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.15.10-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.1.1.0_0.8-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.1.22-1.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:22.7-19.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.50-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.56-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:11.25-14.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7-2.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15-12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-106.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.2-32.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.7-34.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5-18.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-36.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12-16.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.32-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.32-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2p1-18.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2p1-18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6.3-28.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-2.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.25.1-15.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.4-16.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9_beta9-17.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.15-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007.2.15-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-271.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5beta-749.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.9-10.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.12.26-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:18-55.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7.1-17.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-24.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.19-19.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-43.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.0.0-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.3-18.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.0.2-62.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7_2.36_1.19_0.17_0.97-12.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.4-17.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8p12-18.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-9.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.50.9-13.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-16.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.11-20.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.86-21.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:085-30.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1-146.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12r-35.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:28pre13-22.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.16-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.0a-70.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.5-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.97-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.39-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.52-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.104-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.15-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.7-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.8-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.192-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.3-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.11-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.27-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.5-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.8-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.66-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.98-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.4-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.17-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.59-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.175-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.5-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.11-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.117-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.9-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.8-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.32-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.6-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.10-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.2-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.11-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.36-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.5-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.7-0.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.4-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.94-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.6-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.5-3.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.11.0-21.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.4-0.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034660" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.12-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.52-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.55-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.77-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.4-0.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.0.0-0.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.2.0-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.17-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:246-14.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:180-13.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1r588481-1.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-32.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-41.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.75-19.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.5-51.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.6-0.21.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.8-14.29.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.64.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009034918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-23.52</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0_2.6.16.60_0.69.5-1.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.5_2.6.16.60_0.69.5-7.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr11-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.41-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.4-16.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-62.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.32.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.14eol-0.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.14eol-0.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-15.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-37.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.0.1-25.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-16.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.28-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-49.79</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.4-17.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-27.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-30.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.37_f594963d</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.60</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:cvs_060522-0.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94-0.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.77.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.18-24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009035999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-14.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-24.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-32.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.1-17.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.3-224.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20051208-18.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-17.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-17.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.69-18.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-17.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.24-12.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-19.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-17.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.6-19.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.1-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.93.3-0.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-10.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.32-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr12-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-24.43</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-32.39</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-27.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-12.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6.p369-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.701.0-16.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-10.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-26.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2-881.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.4-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.0.1-25.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.32-0.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34_2.6.16.60_0.33-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34-1.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0_2.6.22.19_0.21-1.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.21-0.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.21-0.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-22.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.7-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.9-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0_2.6.22.19_0.19-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0-1.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2-1.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.0.1-1.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.6-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-31.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1_2533-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.19-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.19-0.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.6-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-32.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.0-15.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009031703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94.1-2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.27</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-13.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-29.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-18.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.1-17.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.94.2-1.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.5-14.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0.14eol-0.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.27-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-27.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-27.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.23.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-17.10.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-17.10.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.6-17.10.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.10-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.10-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.0.1-25.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-19.31.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.95-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.24.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-0.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-48.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.20.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.15.1-19.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.9-26.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.8-13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-21.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.4-19.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-23.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-16.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-48.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.1-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.6-17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-43.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.4-16.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-62.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8-15.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-18.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8-15.15.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-18.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0_2.6.22.19_0.22-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.22-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.22-0.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.21-18.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-49.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.15-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.4-2.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.15-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-49.52.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.3-23.55</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.29</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-24.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-32.42</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-29.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-29.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-21.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.41</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.17-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.3.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-23.30.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr9-2.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.5-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-23.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.1-24.48</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.4-32.44</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.707-0.47</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.8.2-110.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-10.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0-50.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.32</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.18-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.8-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.8-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.3-26.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.5-10.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0_2.6.22.19_0.26-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.26</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.26-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-0.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.26-0.33.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-49.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-16.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.0-13.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.32-0.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.2-16.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-13.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.3.1-1.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.0_2.6.22.19_0.23-1.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.22.19-0.23</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.23-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3_2.6.22.19_0.23-0.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.32-0.34.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.32-0.36.50</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.32-0.36.91</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.24.7-20.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-30.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-0.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.17-387.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.15.1-19.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr11-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr11-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.37</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.10.14-16.40.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE12-18.13.982.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE12-18.13.982.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.8-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.1-16.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.13-0.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.3-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.4-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.6-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.5-0.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.13-1.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.10-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009036899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.3.2-15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.22</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.5-9.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:21.5.25.20060327-7.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.30-27.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.1-10.19</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.32-0.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.52.10-7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.25-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.3-1.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.14-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.3-1.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5-1.6.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.3-1.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.14-0.6.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.3-1.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.7-21.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-19.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.18-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.18-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.18-0.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.39.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-15.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-15.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-15.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-15.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.6-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.4-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr11.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.2-1.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.2-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.6-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.19-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.0-1.4.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.9-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.9-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-13.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.7.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.4-17.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-48.13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-48.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-21.22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-21.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.4-19.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-23.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.4-19.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.23-40.57.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.23-40.59.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.48-12.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.22-13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.4-16.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-62.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.3-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.5-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.5-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.16-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.11-14.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.132.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.19-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.19-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.32.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.5-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-657.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.26.22-14.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.39.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.13.6-9.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.07-268.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.07-268.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.12-13.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.18-24.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.77.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-13.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037658" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.5-159.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.5-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.16-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.16-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-19.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.32-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.0.17-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.7-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.7-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-4.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-11.28.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-11.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.3-17.15.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9_beta9-17.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.25.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-23.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-23.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-45.27.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1-45.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8p12-18.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8p12-18.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-84.74.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-69.75.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0-84.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.1-69.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.23-40.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.23-40.60.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.32-0.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-42.85.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009037984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-19.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.15.1-23.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.11-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.11-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.21-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0-37.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.17-3.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.32-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-42.85.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-24.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.27-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-19.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-1.7.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.8-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.43.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.25.40</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.32.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.16-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.16-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.15-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044224" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.32.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-13.12.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.0.26-12.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.1-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.9.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.7.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.22.21.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-19.18.21.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-271.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-43.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1-19.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.74.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-18.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.18-17.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-25.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.15-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-14.17.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7.0.0-1.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.3-17.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33.1-17.13.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.3.1.2-1.6.2.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.2.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20040623-33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20020806-33.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20050526-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1-248.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20030907-59.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20050421-27.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20050719-22.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.1.1-26.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20051213-19.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20041220-26.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20060929-20.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.1-20.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20050711-22.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20031231-26.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20050308-22.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20051016-20.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20020629-243.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20040406-28.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20050901-20.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20030907-54.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20051029-20.14.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20061207-1.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:20060123-20.12.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.01_2.6.16.60_0.69.1-22.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.3_2.6.16.60_0.69.1-3.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.7.22_2.6.16.60_0.69.1-42.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.0_2.6.16.60_0.69.1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.7-15.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.8.6-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.8-1.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6.3-28.25.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.6.3-28.20.3.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-12.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.22-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.4-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.0-18.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.8-15.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.3-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.0-22.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.76.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.01-21.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.4-19.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.27-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.25.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12r-35.41.43.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-15.10.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.7.2-15.10.11.10</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.20-0.7.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.23.13</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.22-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.22-0.6.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.22-0.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-12.30.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.2-12.30.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039483" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2007.05.10-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.3-0.33.32.14</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_24-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_24_2.6.16.60_0.74.7-0.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.96.5-0.4.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-16.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4-16.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.1-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.4-0.7.18</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.1-1.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.9_beta9-17.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-30.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009038985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.35.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.78.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.5-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.17-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.18-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.18-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.20-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.20-1.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6.p369-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-4.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.9-10.30</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-25.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.0-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.69.69.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.9.20-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.77.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.16.60_0.99.13-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-30.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.14.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.4-19.18.222.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-585.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.10-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr12.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.2-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr9.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.12.0-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.22pl4-223.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.22pl4-223.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-7.4.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.11-0.13.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.11-0.12.15</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044232" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.22pl4-223.15.20</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-7.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-7.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-7.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97-5.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.41.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.1-4.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.3.1-4.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.6-24.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.12.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-13.13.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-13.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_36-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_36_2.6.16.60_0.87.4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_26-0.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_26_2.6.16.60_0.81.11-0.6.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.8.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.4-0.7.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.6-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.4-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.2.18-78.13.1.102</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.61-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.21.1-0.8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.81-0.129.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.7.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.0-10.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-14.19.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-18.34.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-13.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.3-19.49.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.7.3-13.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0-39.6.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.6-4.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.42.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR4P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.16.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_37-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_37_2.6.16.60_0.87.9-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.25.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039659" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.0-32.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.4-0.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.48-1.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.60-33.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.27-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.23-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.23-1.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR4P3-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.48-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-12.9.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10-2.17.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7.1-17.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.77.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7.1-17.34.36.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.23-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.48-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.22.0-93.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.8.11-0.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-567.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2011.6.28-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-18.20.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.3-18.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.16.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-0.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.1-1.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.2.6-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6.p369-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.2-20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6-13.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.2-1.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.8.8-14.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-7.7.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-7.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040175" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.76.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.27.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.35.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_37-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_37_2.6.16.60_0.89.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-19.33.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.27-0.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.27-0.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-19.35.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.5-0.8.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.1-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.5-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.31.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.22-0.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.27-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.16.30.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.49.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009039951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.11.9</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.16.32.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.12-27.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-271.37.38.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-43.38.38.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-271.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-43.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.11-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr13.1-0.8.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.15.1-19.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr13.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr10.1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.24-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.24-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.26-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.26-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-15.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-15.16.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-18.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.56.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.26.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.50.9-13.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR5P1-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.31.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.10-11.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.701.0-16.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.4.5.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.27-0.18.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1p1-41.12.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.11-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.60.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-271.46.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-43.46.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.7-271.37.42.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.2-43.38.42.36</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_28-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_28_2.6.16.60_0.83.131-0.6.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0_16718_26-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0_16718_26_2.6.16.60_0.42.54.11-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_38-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_38_2.6.16.60_0.97.1-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-16.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-13.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2008.11.26-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.2-13.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.28-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.0-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.28-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr11.0-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.12.12-19.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.14-14.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.101.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.1.22-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.0-13.15.16</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4-20.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.29.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-19.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.29.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-19.29.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1.3-60.16.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.43-13.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.32-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-42.85.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.12.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.5-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.5.0-2.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr12.0-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.14-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr15.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.0-0.7.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.0-0.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.12.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.12-0.5.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P1-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.31.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr14.0-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.13-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.8.25</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.6-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.6-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.8.31</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.2-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13.6-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.5-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-13.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.0.1-25.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.70.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p23-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.16.60_0.99.36-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.16.60_0.99.38-0.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.2_2.6.16.60_0.99.38-0.14.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.13-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_40-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_40_2.6.16.60_0.97.32-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.7-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.33.1-17.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6b-752.8.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-752.8.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.0-18.8.45</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.33.17</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.6.13-20.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-15.18.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.0.3-20.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.0-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.15-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.30.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.10-22.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-24.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-24.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-24.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-24.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.13-17.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.6.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2013.1.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.8-19.37.24</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.2.5-16.36.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.0-16.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0_16718_26-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.0_16718_26_2.6.16.60_0.42.54.11-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_28-0.6.13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_28_2.6.16.60_0.83.169-0.6.13.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_42-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_42-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_42_2.6.16.60_0.99.8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_42_2.6.16.60_0.99.11-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.32.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.8.2-37.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.2-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.5.27-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.7-7.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P2-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.8.35</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.9-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.15-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.10-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.11-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.5.4.13-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P4-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR7P3-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.3.4-1.31.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:8.15.4-16.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.7-62.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.77.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_28-0.6.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_28_2.6.16.60_0.113.9-0.6.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.103.13-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_44-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_44_2.6.16.60_0.99.13-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.13-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.5.STABLE12-18.13.982.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.43-20.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-18.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.1.10-19.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.8.46</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.4-0.8.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.10.6-0.12.21</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.14.5-0.12.178</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:10.0.12-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.14-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-23.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2-23.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.18-17.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6-13.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.1.15-15.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.99.9-14.17.12</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.1-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.6-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.23-15.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr13.2-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.16-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.10.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.4esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.4-0.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.1-0.6.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.8-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.10.11</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.5esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.6esr-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.17-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.4.2_sr13.18-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr14.0-0.6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr14.0-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-13.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.10.28</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.7esr-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7-0.10.34</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.9.6-0.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.14.3-0.5.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:17.0.8esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.5.0esr-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.28.0-0.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.0-0.10.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.3.7-0.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.22.5-0.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.7.2_20130108-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.26.2-0.9.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.8-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.16.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.4-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.1.19-0.13.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.9.2.28-0.13.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.15.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.8p12-18.21.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.9p23-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.4.4-19.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-30.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-0.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.32.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.2.3-16.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.4-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-36.39.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.7-36.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.82.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.15.1-19.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-20.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009040986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.8.2-5.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.0-30.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.3.1-1.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.0.5-0.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.9.0-50.84.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.2-19.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.97.8-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4.4-18.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-13.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.11.0-20.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:7.15.1-19.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.16-0.5.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.13.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.25-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.107.36-0.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.4-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.9.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.0-0.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009041084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.8.6.p369-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.2.14-0.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.5-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr15.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.6.16.60-0.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.5-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.0-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.80.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.82.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.132.6-0.23.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.132.8-0.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24-0.12.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.6.0esr-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.6-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.7.0esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:24.8.0esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.18.9-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.4-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.16.5-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.4.0esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.3-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.0-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.2.0esr-0.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044340" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.7-0.5.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.17.2-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.3.0esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.1.10-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.0-6.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.9-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.3-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.2.10-13.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.84.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.45.79.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.86.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-13.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.107.24-0.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.02-12.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.10.2-15.14.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.1-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.1-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11P1-0.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-48.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.4p3-48.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.98.6-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.5.0_sr16.10-0.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.4-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.15-0.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.4-31.113.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-13.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.94.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.3esr-0.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:31.5.0esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.7g-13.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:2.13.18-0.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.2.8p8-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.132.4-0.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.132.3-0.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.2.3_17040_46_2.6.16.60_0.132.1-0.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38-0.5.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.4.0esr-0.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.10.10-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.19.2.1-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.6.0_sr16.20-0.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.13.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:1.34b-25.13.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.0.36-0.12.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.3.6b-43.13.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11P1-0.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:9.6ESVR11P1-0.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:0.9.8a-18.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.7.0esr-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12-0.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.20.2-0.7.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:38.8.0esr-0.5.1</evr>
  </rpminfo_state>
 </states>
</oval_definitions>
